{"id":33436,"date":"2023-06-13T07:06:20","date_gmt":"2023-06-13T14:06:20","guid":{"rendered":"https:\/\/pathlock.com\/?page_id=33436"},"modified":"2026-04-09T10:42:08","modified_gmt":"2026-04-09T14:42:08","slug":"vulnerability-management","status":"publish","type":"page","link":"https:\/\/pathlock.com\/de\/vulnerability-management\/","title":{"rendered":"Vulnerability Management"},"content":{"rendered":"\n\n    <link rel=\"stylesheet\" type=\"text\/css\" href=\"https:\/\/pathlock.com\/wp-content\/themes\/_pathlock-dist\/src\/css\/style.min.css?ver=1776346913\" \/>\n\n\n\n\n\n<section class=\"u-section u-section--hero-product !mt-0 pt-[120px]\">\n    <div class=\"u-wrapper u-wrapper--big\">\n\n        <div class=\"hero-product is-blue hero-product--large\">\n\n            <div class=\"hero-product__left\">\n\n                                <span class=\"hero-product__subtitle u-subtitle\">Pathlock Vulnerability Management<\/span>\n                \n                                <h1 class=\"hero-product__title u-title u-title--normal\">Kontinuierliche Schwachstellen-Analysen<\/h1>\n                \n                                <div class=\"hero-product__content u-content\">\n                    <p><span class=\"ui-provider gt b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">Wir kombinieren Transparenz mit Kontext, so dass Sie schnell auf die Risiken zuerst reagieren k\u00f6nnen, die Ihr Unternehmen am meisten gef\u00e4hrden.<\/span><\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n                <\/div>\n                \n                <div class=\"hero-product__btn-hld u-btn-hld\">\n\n                                        <a class=\"hero-product__btn u-btn u-btn--normal\" href=\"https:\/\/pathlock.com\/de\/kontakt\/\" target=\"_blank\">\n                        <span class=\"text\">Demo anfragen<\/span>\n                    <\/a>\n                    \n                    \n                <\/div>\n\n            <\/div>\n\n            <div class=\"hero-product__right\">\n\n\n                <div class=\"hero-product__image\">\n                                                            <img decoding=\"async\" class=\"\" src=\"https:\/\/pathlock.com\/wp-content\/uploads\/fly-images\/33531\/Icon_LP_Vulnerability-Mgmt_500x500px-759x474-c.png\" data-src=\"https:\/\/pathlock.com\/wp-content\/uploads\/fly-images\/33531\/Icon_LP_Vulnerability-Mgmt_500x500px-759x474-c.png\" alt=\"SAP Vulnerability Management\" \/>\n                    \n                   \n                <\/div>\n\n\n            <\/div>\n\n        <\/div>\n        \n                \n\t<\/div>\n<\/section>\n\n\n\n\n            <script>\n            \/\/ Function to get the 'cid' from URL parameters, cookies, or localStorage\n            function getCID() {\n                var cid = null;\n\n                \/\/ 1. Try to get 'cid' from URL parameters\n                var urlParams = new URLSearchParams(window.location.search);\n                if (urlParams.has('cid')) {\n                    cid = urlParams.get('cid');\n                }\n\n                \/\/ 2. If not in URL, try to get 'cid' from localStorage\n                if (!cid) {\n                    try {\n                    cid = localStorage.getItem('salesforce_campaign_id');\n                    } catch (e) {\n                    \/\/ Handle localStorage errors\n                    }\n                }\n\n                \/\/ 3. If not in localStorage, try to get 'cid' from cookies\n                if (!cid) {\n                    var value = \"; \" + document.cookie;\n                    var parts = value.split(\"; salesforce_campaign_id=\");\n                    if (parts.length === 2) {\n                    cid = parts.pop().split(\";\").shift();\n                    }\n                }\n\n                return cid;\n                }\n\n            var cid = getCID(); \/\/ Retrieve the cid value\n\n       \n            if(cid == null){\n                cid = \"701PZ00000IlEYNYA3\"\n                \n            }\n          \n            <\/script>\n<section class=\"u-section u-section--content   is-gray \" data-block=\"content\">\n\n    <div class=\"u-wrapper u-wrapper--normal\">\n        <div class=\"content-hld\" data-aos=\"fade-in\">\n\n                        <p class=\"content__subtitle u-subtitle\">SAP Vulnerability Management<\/p>\n            \n                        <h2 class=\"content__title u-title u-title--normal\">Schwachstellen-Analysen f\u00fcr sichere Systemkonfigurationen und Schnittstellen<\/h2>\n            \n                                    <div class=\"content__content u-content\">\n                <p>In der Praxis stellen wir immer wieder fest, dass IT-Risikomanagement zu oft als reaktiver Prozess verstanden wird. Auch die Schnittstellen zu anderen Systemen werden bei der Absicherung oft vernachl\u00e4ssigt und sind ungesch\u00fctzt ein attraktives Ziel f\u00fcr Hacker.<\/p>\n<p><strong>Das Pathlock Vulnerability Management<\/strong> stellt Zusammenh\u00e4nge so transparent dar, dass Ihre Sicherheits- und Compliance-Verantwortlichen schnell auf Risiken reagieren k\u00f6nnen. Die L\u00f6sung beinhaltet eine kontinuierliche Schwachstellen-Analyse Ihrer Finanz-, HR- und ERP-Applikationen \u00fcber alle Ebenen, einschlie\u00dflich Betriebssysteme, Datenbanken, Netzwerkkonfigurationen und System-Schnittstellen. Dar\u00fcber hinaus unterst\u00fctzen wir Sie bei der Priorisierung von Ma\u00dfnahmen, um Sicherheitsl\u00fccken verl\u00e4sslich zu bereinigen.<\/p>\n<p>Die Kombination mit <a href=\"https:\/\/pathlock.com\/de\/threat-detection\/\" rel=\"noopener\">Pathlock Threat Detection<\/a><span class=\"ui-provider gt b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\"> ist dabei die<\/span> perfekte Erg\u00e4nzung <span class=\"ui-provider gt b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">f\u00fcr eine umfassende Absicherung Ihrer Systemlandschaft.<\/span><\/p>\n<p> <\/p>\n            <\/div>\n            \n                        <div class=\"content__btn-hld u-btn-hld\">\n\n                                <a class=\"content__btn u-btn u-btn--normal\" href=\"https:\/\/pathlock.com\/de\/kontakt\/\" target=\"_blank\">\n                    <span class=\"text\">Security-Spezialisten kontaktieren<\/span>\n                <\/a>\n                \n                \n            <\/div>\n            \n        <\/div>\n\n    <\/div>\n\n    \n<\/section>\n\n\n<script src=\"https:\/\/unpkg.com\/petite-vue\" defer init><\/script>\n\n\n<section class=\"u-section u-section--hero-product \" data-block=\"hero-product\" data-aos=\"fade-in\">\n\n    <div class=\"u-wrapper u-wrapper--big\">\n\n        <div class=\"hero-product hero-product--white is-photo-on-right\" >\n            <div class=\"hero-product__left\">\n\n                                <span class=\"hero-product__subtitle u-subtitle\">Bedrohungen immer einen Schritt voraus <\/span>\n                \n                                <h2 class=\"hero-product__title u-title u-title--normal\">Vulnerability Management<\/h2>\n                \n                                <div class=\"hero-product__content u-content\">\n                    <p>Unser automatisiertes Schwachstellenmanagement hilft Ihnen, Schwachstellen automatisch zu identifizieren und zu beheben. So sparen Sie Ressourcen und reduzieren gleichzeitig unerw\u00fcnschte Risiken und m\u00f6gliche Ausfallzeiten.<\/p>\n<p> <\/p>\n<p> <\/p>\n                <\/div>\n                \n                <div class=\"hero-product__btn-hld u-btn-hld\">\n\n                    \n                    \n                <\/div>\n\n            <\/div>\n\n            <div class=\"hero-product__right\">\n\n                <div class=\"hero-product__image\" v-scope=\"{modal: false}\">\n                      <div class=\"video__cover--hero video__cover--green\" data-id=\"32930\">\n                                                    <img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/pathlock.com\/wp-content\/uploads\/fly-images\/32930\/VM-video-cover-image-1240x918-c.png\" data-src=\"https:\/\/pathlock.com\/wp-content\/uploads\/fly-images\/32930\/VM-video-cover-image-1240x918-c.png\" width=\"400\" height=\"534\" alt=\"VM-video-cover-image\" \/>\n                          \n\n                          <div class=\"video__cover-play-hld\" \">\n                            <button v-show=\"!modal\" class=\"video-button-play is-play js-yt-play\"  @click=\"modal = true\" :aria-expanded=\"modal ? 'true' : 'false'\">\n                                <span class=\"icon icon-play\"><\/span>\n                            <\/button>\n\n                          <\/div>\n                      <\/div>\n                      <div v-show=\"modal\">\n                          <div class=\"modal-overlay\" id=\"modal-overlay\"><\/div>\n  \n                              <div class=\"modal\" id=\"modal\">\n                                  <button v-show=\"modal\" @click=\"modal = false\" class=\"close-button\" id=\"close-button\">\n                                    <svg width=\"18\" height=\"17\" viewBox=\"0 0 18 17\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                        <line x1=\"1.35355\" y1=\"0.646447\" x2=\"17.3536\" y2=\"16.6464\" stroke=\"white\"\/>\n                                        <line y1=\"-0.5\" x2=\"22.6274\" y2=\"-0.5\" transform=\"matrix(-0.707107 0.707107 0.707107 0.707107 17 1)\" stroke=\"white\"\/>\n                                    <\/svg>\n                                    <\/button>\n                                  <div class=\"modal-guts\">\n                                      <iframe v-if=\"modal == true\" style=\"width:100%;height:auto;aspect-ratio: 16 \/ 9;margin:10px 0;\" v-show=\"modal\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/Jmc-6CpYaoY\"><\/iframe>\n                                  <\/div>\n                              <\/div>\n                      <\/div>\n                <\/div>\n\n\n            <\/div>\n\n        <\/div>\n\n\t<\/div>\n\n<\/section>\n\n\n<style>\n    .modal {\n  \/* This way it could be display flex or grid or whatever also. *\/\n  display: block;\n  \n  \/* Probably need media queries here *\/\n  width: 100%;\n  max-width: 1308px;\n  \n  height: 85%;\n  max-height: 100%;\n  \n  position: fixed;\n  \n  z-index: 100;\n  \n  left: 50%;\n  bottom: 6%;\n  overflow: hidden;\n  \n  \/* Use this for centering if unknown width\/height *\/\n  transform: translate(-50%, 0%);\n}\n.closed {\n  display: none;\n}\n\n.modal-overlay {\n  position: fixed;\n  top: 0;\n  left: 0;\n  width: 100%;\n  height: 100%;\n  z-index: 50;\n  \n  background: rgba(0, 0, 0, 0.8);\n}\n.modal-guts {\n  position: absolute;\n  top: 25px;\n  left: 0;\n  width: 100%;\n  height: auto;\n  min-height: 400px;\n  overflow: hidden;\n  padding: 0 15px;\n}\n\n\n.modal .close-button {\n  position: absolute;\n  background-color: transparent;\n  border: none;\n  \/* don't need to go crazy with z-index here, just sits over .modal-guts *\/\n  z-index: 99;\n  \n  top: 7px;\n  \n  \/* needs to look OK with or without scrollbar *\/\n  right: 15px;\n\n}\n\n\/* .open-button {\n  border: 0;\n  position: absolute;\n  top: 50%;\n  left: 50%;\n  transform: translate(-50%, -50%);\n  background: lightgreen;\n  color: white;\n  padding: 10px 20px;\n  border-radius: 10px;\n  font-size: 21px;\n} *\/\n<\/style>\n\n\n\n<section class=\"u-section u-section--tile-grid js-scrolled-element\" data-block=\"tile-grid\" data-aos=\"fade-in\" data-aos=\"fade-in\" data-anchor=\"form-scroll\">\n\n\t<div class=\"u-wrapper u-wrapper--big\" >\n\n                <h2 class=\"tile-grid__title u-title u-title--normal\">\n            Ihre Vorteile auf einen Blick        <\/h2>\n        \n                <div class=\"tile-grid__list four-col\">\n\n                                    <div class=\"tile-grid__item\">\n     \n                                                <div class=\"tile-grid__item-title\">\n                    Automatisierte Policy-basierte Pr\u00fcfung                <\/div>\n                \n                                <div class=\"text\">\n                    Alle sicherheitsrelevanten Parameter und Einstellungen werden vollautomatisiert \u00fcberpr\u00fcft. Ber\u00fccksichtigung des DSAG-Pr\u00fcfleitfadens, der BSI-Empfehlungen sowie der SAP Security Guidelines.                <\/div>\n                                            <\/div>\n                                    <div class=\"tile-grid__item\">\n     \n                                                <div class=\"tile-grid__item-title\">\n                    Bereitstellung als Default Policy                <\/div>\n                \n                                <div class=\"text\">\n                    M\u00f6glichkeit zur Integration kundenspezifischer Regelwerke und Planung wiederkehrender Audits. Durchf\u00fchrung und Umfang k\u00f6nnen dabei individuell definiert werden.                <\/div>\n                                            <\/div>\n                                    <div class=\"tile-grid__item\">\n     \n                                                <div class=\"tile-grid__item-title\">\n                    Umfassende Transparenz                 <\/div>\n                \n                                <div class=\"text\">\n                    Analyse ein- und ausgehender RFC-, http- und Datenbankverbindungen \u00fcber Systemgrenzen hinweg.  Generierung passender RFC-Rollen auf Knopfdruck.                <\/div>\n                                            <\/div>\n                                    <div class=\"tile-grid__item\">\n     \n                                                <div class=\"tile-grid__item-title\">\n                    Web-UI basiertes Security Dashboard                <\/div>\n                \n                                <div class=\"text\">\n                    \u00dcbersichtliche Ausgabe in grafischer und tabellarischer Form, angereichert mit Informationen zur Risiko-Klassifizierung und Empfehlungen f\u00fcr die Schwachstellenbeseitigung.\r\n\r\n                <\/div>\n                                            <\/div>\n            \n        <\/div>\n        \n\n\n    <\/div>\n\n<\/section>\n\n\n\n\n<section class=\"u-section u-section--content is-centered gray-bg-img\" data-block=\"content\">\n\n    <div class=\"u-wrapper u-wrapper--normal\">\n\n        <div class=\"content-hld is-centered cta-gray-hld\" data-aos=\"fade-in\">\n\n                                                <div class=\"content__photo\" data-aos=\"fade-in\">\n                        <img class=\"js-lazy\" data-src=\"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/PLDE_ITOK_SAP-ETD.jpg\" alt=\"Yin yang symbol in the glowing light bulb. SAP Security Expert Talk.\" \/>\n                    <\/div>\n                            \n                            <h2 class=\"content__title u-title u-title--normal\">Ying und Yang der SAP-Sicherheit:<\/h2>\n            \n                            <div class=\"content__content u-content\">\n                    <h3>Threat Detection &amp; Vulnerability Management<\/h3>\n<p>In diesem Expert Talk zeigen wir Ihnen zusammen mit unserem Partner SAP anhand von Best Cases, warum eine fundierte Schwachstellen-Analyse eine elementare Komponente jeder erfolgreichen Threat Detection-Strategie ist.<\/p>\n                <\/div>\n            \n                            <div class=\"content__btn-hld u-btn-hld\">\n                    <a class=\"content__btn u-btn u-btn--normal\" href=\"https:\/\/pathlock.com\/de\/resource\/expert-talk-ying-und-yang-der-sap-sicherheit\/\" target=\"_blank\">\n                        <span class=\"text\">Expert Talk ansehen<\/span>\n                    <\/a>\n                <\/div>\n            \n        <\/div>\n\n    <\/div>\n\n<\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":39,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":true,"footnotes":""},"class_list":["post-33436","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Vulnerability Management | automatisiert und transparent<\/title>\n<meta name=\"description\" content=\"Unser SAP Vulnerability Management bietet Ihnen eine kontinuierliche Schwachstellen-Analyse Ihrer Finanz-, HR- und ERP-Applikationen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pathlock.com\/de\/vulnerability-management\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Vulnerability Management | automatisiert und transparent\" \/>\n<meta property=\"og:description\" content=\"Unser SAP Vulnerability Management bietet Ihnen eine kontinuierliche Schwachstellen-Analyse Ihrer Finanz-, HR- und ERP-Applikationen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pathlock.com\/de\/vulnerability-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Pathlock\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-09T14:42:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pathlock.com\/wp-content\/uploads\/2025\/06\/OpenGraph-Pathlock-Logo.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"SAP Vulnerability Management | automatisiert und transparent\" \/>\n<meta name=\"twitter:description\" content=\"Unser SAP Vulnerability Management bietet Ihnen eine kontinuierliche Schwachstellen-Analyse Ihrer Finanz-, HR- und ERP-Applikationen.\" \/>\n<meta name=\"twitter:site\" content=\"@pathlock\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/vulnerability-management\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/vulnerability-management\\\/\",\"name\":\"SAP Vulnerability Management | automatisiert und transparent\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#website\"},\"datePublished\":\"2023-06-13T14:06:20+00:00\",\"dateModified\":\"2026-04-09T14:42:08+00:00\",\"description\":\"Unser SAP Vulnerability Management bietet Ihnen eine kontinuierliche Schwachstellen-Analyse Ihrer Finanz-, HR- und ERP-Applikationen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/vulnerability-management\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pathlock.com\\\/de\\\/vulnerability-management\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/vulnerability-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\",\"name\":\"Pathlock\",\"description\":\"The Leader in Application Security and Controls Automation\",\"publisher\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pathlock.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#organization\",\"name\":\"Pathlock, Inc\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"contentUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"width\":460,\"height\":148,\"caption\":\"Pathlock, Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/pathlock\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pathlock\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCgo4izMJ70K4gnyWQ_mP-OA\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Vulnerability Management | automatisiert und transparent","description":"Unser SAP Vulnerability Management bietet Ihnen eine kontinuierliche Schwachstellen-Analyse Ihrer Finanz-, HR- und ERP-Applikationen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pathlock.com\/de\/vulnerability-management\/","og_locale":"de_DE","og_type":"article","og_title":"SAP Vulnerability Management | automatisiert und transparent","og_description":"Unser SAP Vulnerability Management bietet Ihnen eine kontinuierliche Schwachstellen-Analyse Ihrer Finanz-, HR- und ERP-Applikationen.","og_url":"https:\/\/pathlock.com\/de\/vulnerability-management\/","og_site_name":"Pathlock","article_modified_time":"2026-04-09T14:42:08+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/pathlock.com\/wp-content\/uploads\/2025\/06\/OpenGraph-Pathlock-Logo.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_title":"SAP Vulnerability Management | automatisiert und transparent","twitter_description":"Unser SAP Vulnerability Management bietet Ihnen eine kontinuierliche Schwachstellen-Analyse Ihrer Finanz-, HR- und ERP-Applikationen.","twitter_site":"@pathlock","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pathlock.com\/de\/vulnerability-management\/","url":"https:\/\/pathlock.com\/de\/vulnerability-management\/","name":"SAP Vulnerability Management | automatisiert und transparent","isPartOf":{"@id":"https:\/\/pathlock.com\/de\/#website"},"datePublished":"2023-06-13T14:06:20+00:00","dateModified":"2026-04-09T14:42:08+00:00","description":"Unser SAP Vulnerability Management bietet Ihnen eine kontinuierliche Schwachstellen-Analyse Ihrer Finanz-, HR- und ERP-Applikationen.","breadcrumb":{"@id":"https:\/\/pathlock.com\/de\/vulnerability-management\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pathlock.com\/de\/vulnerability-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/pathlock.com\/de\/vulnerability-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pathlock.com\/de\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Management"}]},{"@type":"WebSite","@id":"https:\/\/pathlock.com\/de\/#website","url":"https:\/\/pathlock.com\/de\/","name":"Pathlock","description":"The Leader in Application Security and Controls Automation","publisher":{"@id":"https:\/\/pathlock.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pathlock.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/pathlock.com\/de\/#organization","name":"Pathlock, Inc","url":"https:\/\/pathlock.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/pathlock.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","contentUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","width":460,"height":148,"caption":"Pathlock, Inc"},"image":{"@id":"https:\/\/pathlock.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/pathlock","https:\/\/www.linkedin.com\/company\/pathlock","https:\/\/www.youtube.com\/channel\/UCgo4izMJ70K4gnyWQ_mP-OA"]}]}},"ACF":false,"_links":{"self":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/pages\/33436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/comments?post=33436"}],"version-history":[{"count":0,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/pages\/33436\/revisions"}],"wp:attachment":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/media?parent=33436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}