{"id":19519,"date":"2026-03-31T14:00:12","date_gmt":"2026-03-31T12:00:12","guid":{"rendered":"https:\/\/nexis-secure.com\/en\/insights\/blog\/\/"},"modified":"2026-04-07T08:19:51","modified_gmt":"2026-04-07T06:19:51","slug":"nexis-impulse-april","status":"publish","type":"post","link":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/","title":{"rendered":"NEXIS Impulse April"},"content":{"rendered":"<h2>Welcome to the April Edition of NEXIS Impulse!<\/h2>\n<p>Every month we keep you informed about current developments at Nexis, share insights into our <strong>NEXIS Platform<\/strong> and provide updates from the world of Identity Analytics &amp; Access Governance and GRC.<\/p>\n<p>Enjoy reading!<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Don&#8217;t Miss Our Upcoming Webinar!<\/strong><\/h2>\n<p><strong>From IAM Transformation to Organizational Adoption: Lessons from HCOB on Bridging Technology and Business<\/strong><\/p>\n<p>How do you turn IAM from an IT initiative into a shared organizational capability?<\/p>\n<p>Based on HCOB\u2019s transformation experience, this session explores how governance documentation, role management, transparency, and automation can be embedded into daily operations \u2013 and why clear responsibilities and active business involvement are essential for long-term success.<\/p>\n<p>Join Matthias Kruse (Head of IAM, HCOB) and Dr. Heiko Klarl (CEO, Nexis) for an interactive discussion on practical lessons learned, with a focus on adoption, ownership, and continuous improvement. Expect minimal slides, open dialogue, and live Q&amp;A.<\/p>\n<p>April 16, 2026 | 4:00 p.m. CEST | Language: English | Format: Live with Q&amp;A<\/p>\n<p><a href=\"https:\/\/nexis-secure.com\/en\/webinars\/from-iam-transformation-to-organizational-adoption\/\" target=\"_blank\" rel=\"noopener\">Register Now<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>NEXIS Included in Two KuppingerCole Analysts Leadership Compasses<\/h2>\n<p>We are proud to share that Nexis has been included in two KuppingerCole Analysts Leadership Compass 2026 reports:<\/p>\n<p>\ud83d\udcc4Business Application Risk Management<\/p>\n<p>\ud83d\udcc4SAP Access Control and Security<\/p>\n<p>For us, this is a meaningful milestone. It reflects the growing importance of connected, transparent, and risk-aware access governance across complex application landscapes. As IAM continues to expand beyond traditional boundaries, organizations need consistent governance across SAP, non-SAP, and SaaS environments. This is exactly where Nexis focuses, bringing together IAM and GRC to create clarity and control across identities, roles, and entitlements.<\/p>\n<p><a href=\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-included-in-two-recent-kuppingercole-analysts-leadership-compass-reports\/\" target=\"_blank\" rel=\"noopener\">Find Out More About the Reports<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>NEXIS INVOLVE 2026 \u2013 Open for Registration<\/h2>\n<p>With NEXIS INVOLVE, we bring together IAM and GRC professionals for two days focused on practical insights, real-world experience, and meaningful exchange.<\/p>\n<p>The event is designed for those who want to go beyond theory: combining expert talks, customer perspectives, and hands-on sessions around Identity Governance, Access Control, and GRC. Just as important: time to connect with peers, share experiences, and discuss what actually works in practice.<\/p>\n<p>Jahnstadion Regensburg | September 9\u201310, 2026 | 10+ speakers<\/p>\n<p><a href=\"https:\/\/nexis-secure.com\/en\/events\/nexis-involve\/\">Secure Your Spot<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>New KuppingerCole Report: The IVIP Capabilities of the NEXIS Platform<\/h2>\n<p>As IAM environments become more fragmented, organizations often lack transparency across identities and access. The latest KuppingerCole Executive View shows how Identity Visibility and Intelligence Platforms introduce a unified layer of visibility, analytics, and governance.<\/p>\n<p>The report also highlights how the NEXIS Platform combines IAM and GRC to enable context-aware, intelligence-driven identity governance.<\/p>\n<p>What you&#8217;ll learn:<\/p>\n<ul>\n<li>IVIP as the missing layer in fragmented IAM<\/li>\n<li>How AI (incl. NICO) supports decision-making<\/li>\n<li>Dynamic authorization and real-time signals<\/li>\n<li>Identity analytics, role modeling, and SoD<\/li>\n<li>Continuous compliance and audit readiness<\/li>\n<\/ul>\n<p><a href=\"https:\/\/nexis-secure.com\/en\/insights\/document\/kuppingercole-executive-view-2026\/\">Download the Report<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>Meet Us at EIC 2026 in Berlin!<\/h2>\n<p>We\u2019re looking forward to being back at the <a href=\"https:\/\/www.kuppingercole.com\/events\/eic2026\" target=\"_blank\" rel=\"noopener\">European Identity and Cloud Conference (EIC)<\/a> in Berlin this May. Throughout the conference, you\u2019ll find us on-site sharing insights, discussing current challenges, and showcasing how organizations bring more structure and transparency into their IAM landscapes.<\/p>\n<p>What&#8217;s happening at EIC:<\/p>\n<ul>\n<li>Booth 18 \u2013 Meet us for live demos and conversations<\/li>\n<li>2 Panel Sessions \u2013 Insights on authorization &amp; next-gen access control<\/li>\n<li>Exclusive Dinners (May 20 &amp; 21) \u2013 Small group exchange in a relaxed setting<\/li>\n<li>25% Discount \u2013 Save on your EIC ticket<\/li>\n<\/ul>\n<p>Find all details, reserve your dinner seat, and get your discount code:<\/p>\n<p><a href=\"https:\/\/go.nexis-secure.com\/meet-us-eic\">Join Us in Berlin<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>Identity Analytics \u2013 From Data to Real Insight<\/h2>\n<p>In many organizations, identity data is spread across IGA systems, PAM tools, and business applications, making it difficult to gain a clear and reliable view of access.<\/p>\n<p>NEXIS brings these data sources together into a unified analytical layer, turning fragmented data into actionable insight. This allows teams to identify risky access patterns, understand how entitlements evolve over time, and reconstruct access situations for audits or investigations.<\/p>\n<p>Whether it\u2019s analyzing privilege growth, uncovering SoD conflicts, or supporting audit-ready decisions, Identity Analytics helps turn visibility into control.<\/p>\n<p><a href=\"https:\/\/nexis-secure.com\/en\/solutions\/iam\/identity-analytics\/\">Explore Identity Analytics with NEXIS<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2><strong data-start=\"0\" data-end=\"47\">Upcoming Events &#8211; Meet Us!<\/strong><\/h2>\n<ul>\n<li data-start=\"733\" data-end=\"832\"><a href=\"https:\/\/go.nexis-secure.com\/e3t\/Ctc\/5I+113\/dk7klx04\/VVJVz2235yGGW5CVLBx3yf66RW2SWDgt5L9LydN78Lwvg3qgz0W7Y8-PT6lZ3l3W8ctw0l1rMrNGW4jPhnd5sz3KdVnYHBX3Z13V1W8p_Tv98n7FFXW3_Lrsc6KFl3-W3fFQ6_3n712mVWBx3z2YFpTDW7np__95hSQ62W8Mh5lv5d8STdN5qcphGbW-sHW8K0Lm23tqf7rW7QxmDb5BH8HRW2nRGtW3t_GskVYQqkb2NW9f7W2PKG0z2wZxRtW2HGHyG2dt1MdN7F-VQ9T_TdYW2Q7mNP98y4kBVj1Ywg6zd1bsW67CtvR1b3cYYW4L68x66yZ5jbW6xx2J-18vHwBW5bhFhD3-fqCcW6Y5Lr72bHGxrW9jkjzF4gyxncW94b7cW41qcQkf3SrrPj04\" data-hs-link-id=\"0\" data-hs-link-id-v2=\"B5aUf35Q\">Ventum IT Security Expert Summit<\/a> in Vienna (April 9, 2026)<\/li>\n<li data-start=\"733\" data-end=\"832\"><a href=\"https:\/\/www.timetoact-group.com\/insights-conference\">INSIGHTS Conference<\/a> in Cologne (April 23, 2026)<\/li>\n<li data-start=\"733\" data-end=\"832\"><a href=\"https:\/\/go.nexis-secure.com\/e3t\/Ctc\/5I+113\/dk7klx04\/VVJVz2235yGGW5CVLBx3yf66RW2SWDgt5L9LydN78Lwvg3qgz0W7Y8-PT6lZ3ktW5t6qHW4ThqwJW3gtTjW5dy4ttVFrQf13cj8XNW9gbHWt4kZby-W6kznPT7Jmjm3W6qLwpF8yxqRGW5F39KB8yWsd0W2TwjPr6x7qtHW4vpyr95ycXSZW1p41rH85ZGW9W1JMgQK5vCR-7W2CJRgd6-PX4DVZ1h3R8p9Yp4W7SfcfX5MKbDFN5VjxbgtYtmsW9bHkjS3JGKCwW1Fznt11XTw15W85_Ssf6xKmmfW3HRSz94Mhb4mW3zrsMP7CtYYJN3FpP6XBXqqYW9610112xsk8qW3gCBZ75q2xLJW7rwNB659z1RfW3DJjgH4HHN-GW1Gkwqx4vVTPWf6JZQP004\" data-hs-link-id=\"0\" data-hs-link-id-v2=\"Dc6NqfSV\">State of Identity<\/a> in Stockholm (May 6, 2026)<\/li>\n<li><a href=\"https:\/\/go.nexis-secure.com\/e3t\/Ctc\/5I+113\/dk7klx04\/VVJVz2235yGGW5CVLBx3yf66RW2SWDgt5L9LydN78Lwvg3qgz0W7Y8-PT6lZ3mYN1y32ZnvZhbBW1sNv4C5xYnRxW5PPqb14VmzhKW3SbH7T6StpT7V2zCc84TM65-W8WyMy63t9p4cW4n76bs1Gf-1_V9yDSg8jSfXMW8xQdLS7_XN6cVbBsMm7sJcPwW1pJ-qD4KvktGN7BdTT3PWmFHN66gyptp2XHJW2MF6kl5fqswSW5WPC4_6ysJhLVN_h2R3z03XFW8fL9l8181lGDW3MH_Y079v6WnN8lPwdY8gyY6W3wTqgF7-kCdYW5cfDV22z1ZpzN5ScQjn5NRQvW4yvQNp6ysvqzW8SmvR42GRc3HW2vr79s2rVV8PVS7V7q93TD5Vf1gRwVP04\" data-hs-link-id=\"0\" data-hs-link-id-v2=\"MFBJ63IC\">European Identity and Cloud Conference<\/a> in Berlin (May 19 &#8211; 22, 2026)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the April Edition of NEXIS Impulse! Every month we keep you informed about current developments at Nexis, share insights into our NEXIS Platform and provide updates from the world of Identity Analytics &amp; Access Governance and GRC. Enjoy reading! &nbsp; Don&#8217;t Miss Our Upcoming Webinar! From IAM Transformation to Organizational Adoption: Lessons from&#8230;<\/p>\n","protected":false},"author":9,"featured_media":19520,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[68,1,69,70],"tags":[],"class_list":["post-19519","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-grc","category-iam","category-news","category-nexis-impulse","vs-blog blog-single"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NEXIS Impulse April - NEXIS Platform<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NEXIS Impulse April - NEXIS Platform\" \/>\n<meta property=\"og:description\" content=\"Welcome to the April Edition of NEXIS Impulse! Every month we keep you informed about current developments at Nexis, share insights into our NEXIS Platform and provide updates from the world of Identity Analytics &amp; Access Governance and GRC. Enjoy reading! &nbsp; Don&#8217;t Miss Our Upcoming Webinar! From IAM Transformation to Organizational Adoption: Lessons from...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/\" \/>\n<meta property=\"og:site_name\" content=\"NEXIS Platform\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-31T12:00:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T06:19:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/03\/Nexis-Blog-6-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"vSteinberger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"vSteinberger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/\"},\"author\":{\"name\":\"vSteinberger\",\"@id\":\"https:\/\/nexis-secure.com\/en\/#\/schema\/person\/5050b63bae737b3b4a583dbd88c1e704\"},\"headline\":\"NEXIS Impulse April\",\"datePublished\":\"2026-03-31T12:00:12+00:00\",\"dateModified\":\"2026-04-07T06:19:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/\"},\"wordCount\":692,\"publisher\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/03\/Nexis-Blog-6.png\",\"articleSection\":[\"GRC\",\"IAM\",\"NEWS\",\"NEXIS IMPULSE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/\",\"url\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/\",\"name\":\"NEXIS Impulse April - NEXIS Platform\",\"isPartOf\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/03\/Nexis-Blog-6.png\",\"datePublished\":\"2026-03-31T12:00:12+00:00\",\"dateModified\":\"2026-04-07T06:19:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/#primaryimage\",\"url\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/03\/Nexis-Blog-6.png\",\"contentUrl\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/03\/Nexis-Blog-6.png\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/nexis-secure.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NEXIS Impulse April\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nexis-secure.com\/en\/#website\",\"url\":\"https:\/\/nexis-secure.com\/en\/\",\"name\":\"NEXIS Platform\",\"description\":\"The modular identity governance platform for regulated enterprise\",\"publisher\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/#organization\"},\"alternateName\":\"Nexis\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nexis-secure.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/nexis-secure.com\/en\/#organization\",\"name\":\"Nexis Group\",\"alternateName\":\"Nexis\",\"url\":\"https:\/\/nexis-secure.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nexis-secure.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS-Logo-scaled.png\",\"contentUrl\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS-Logo-scaled.png\",\"width\":2560,\"height\":635,\"caption\":\"Nexis Group\"},\"image\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/nexis-secure.com\/en\/#\/schema\/person\/5050b63bae737b3b4a583dbd88c1e704\",\"name\":\"vSteinberger\",\"url\":\"https:\/\/nexis-secure.com\/en\/author\/vsteinberger\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NEXIS Impulse April - NEXIS Platform","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/","og_locale":"en_US","og_type":"article","og_title":"NEXIS Impulse April - NEXIS Platform","og_description":"Welcome to the April Edition of NEXIS Impulse! Every month we keep you informed about current developments at Nexis, share insights into our NEXIS Platform and provide updates from the world of Identity Analytics &amp; Access Governance and GRC. Enjoy reading! &nbsp; Don&#8217;t Miss Our Upcoming Webinar! From IAM Transformation to Organizational Adoption: Lessons from...","og_url":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/","og_site_name":"NEXIS Platform","article_published_time":"2026-03-31T12:00:12+00:00","article_modified_time":"2026-04-07T06:19:51+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/03\/Nexis-Blog-6-1024x576.png","type":"image\/png"}],"author":"vSteinberger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"vSteinberger","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/#article","isPartOf":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/"},"author":{"name":"vSteinberger","@id":"https:\/\/nexis-secure.com\/en\/#\/schema\/person\/5050b63bae737b3b4a583dbd88c1e704"},"headline":"NEXIS Impulse April","datePublished":"2026-03-31T12:00:12+00:00","dateModified":"2026-04-07T06:19:51+00:00","mainEntityOfPage":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/"},"wordCount":692,"publisher":{"@id":"https:\/\/nexis-secure.com\/en\/#organization"},"image":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/#primaryimage"},"thumbnailUrl":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/03\/Nexis-Blog-6.png","articleSection":["GRC","IAM","NEWS","NEXIS IMPULSE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/","url":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/","name":"NEXIS Impulse April - NEXIS Platform","isPartOf":{"@id":"https:\/\/nexis-secure.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/#primaryimage"},"image":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/#primaryimage"},"thumbnailUrl":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/03\/Nexis-Blog-6.png","datePublished":"2026-03-31T12:00:12+00:00","dateModified":"2026-04-07T06:19:51+00:00","breadcrumb":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/#primaryimage","url":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/03\/Nexis-Blog-6.png","contentUrl":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/03\/Nexis-Blog-6.png","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/nexis-impulse-april\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/nexis-secure.com\/en\/"},{"@type":"ListItem","position":2,"name":"NEXIS Impulse April"}]},{"@type":"WebSite","@id":"https:\/\/nexis-secure.com\/en\/#website","url":"https:\/\/nexis-secure.com\/en\/","name":"NEXIS Platform","description":"The modular identity governance platform for regulated enterprise","publisher":{"@id":"https:\/\/nexis-secure.com\/en\/#organization"},"alternateName":"Nexis","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nexis-secure.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nexis-secure.com\/en\/#organization","name":"Nexis Group","alternateName":"Nexis","url":"https:\/\/nexis-secure.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nexis-secure.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS-Logo-scaled.png","contentUrl":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS-Logo-scaled.png","width":2560,"height":635,"caption":"Nexis Group"},"image":{"@id":"https:\/\/nexis-secure.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nexis-secure.com\/en\/#\/schema\/person\/5050b63bae737b3b4a583dbd88c1e704","name":"vSteinberger","url":"https:\/\/nexis-secure.com\/en\/author\/vsteinberger\/"}]}},"_links":{"self":[{"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/posts\/19519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/comments?post=19519"}],"version-history":[{"count":3,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/posts\/19519\/revisions"}],"predecessor-version":[{"id":19616,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/posts\/19519\/revisions\/19616"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/media\/19520"}],"wp:attachment":[{"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/media?parent=19519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/categories?post=19519"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/tags?post=19519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}