{"id":33440,"date":"2023-06-13T07:05:09","date_gmt":"2023-06-13T14:05:09","guid":{"rendered":"https:\/\/pathlock.com\/?page_id=33440"},"modified":"2026-04-09T10:39:16","modified_gmt":"2026-04-09T14:39:16","slug":"threat-detection","status":"publish","type":"page","link":"https:\/\/pathlock.com\/de\/threat-detection\/","title":{"rendered":"Threat Detection"},"content":{"rendered":"\n\n    <link rel=\"stylesheet\" type=\"text\/css\" href=\"https:\/\/pathlock.com\/wp-content\/themes\/_pathlock-dist\/src\/css\/style.min.css?ver=1778007637\" \/>\n\n\n\n\n\n<section class=\"u-section u-section--hero-product !mt-0 pt-[120px]\">\n    <div class=\"u-wrapper u-wrapper--big\">\n\n        <div class=\"hero-product is-blue hero-product--large\">\n\n            <div class=\"hero-product__left\">\n\n                                <span class=\"hero-product__subtitle u-subtitle\">Pathlock Threat Detection<\/span>\n                \n                                <h1 class=\"hero-product__title u-title u-title--normal\">Cyberangriffe in Echtzeit erkennen<\/h1>\n                \n                                <div class=\"hero-product__content u-content\">\n                    <p>Dank einer kontinuierlichen \u00dcberwachung Ihrer SAP-Systeme auf interne und externe Risiken sind Sie in der Lage, auf potenzielle Gefahren schneller zu reagieren.<\/p>\n                <\/div>\n                \n                <div class=\"hero-product__btn-hld u-btn-hld\">\n\n                                        <a class=\"hero-product__btn u-btn u-btn--normal\" href=\"https:\/\/pathlock.com\/de\/kontakt\/\" target=\"_blank\">\n                        <span class=\"text\">Demo anfragen<\/span>\n                    <\/a>\n                    \n                    \n                <\/div>\n\n            <\/div>\n\n            <div class=\"hero-product__right\">\n\n\n                <div class=\"hero-product__image\">\n                                                            <img decoding=\"async\" class=\"\" src=\"https:\/\/pathlock.com\/wp-content\/uploads\/fly-images\/33530\/Icon_LP_Threat-Detection_500x500px-759x474-c.png\" data-src=\"https:\/\/pathlock.com\/wp-content\/uploads\/fly-images\/33530\/Icon_LP_Threat-Detection_500x500px-759x474-c.png\" alt=\"PLDE_Icon_LP_Threat Detection_500x500px\" \/>\n                    \n                   \n                <\/div>\n\n\n            <\/div>\n\n        <\/div>\n        \n                \n\t<\/div>\n<\/section>\n\n\n\n\n            <script>\n            \/\/ Function to get the 'cid' from URL parameters, cookies, or localStorage\n            function getCID() {\n                var cid = null;\n\n                \/\/ 1. Try to get 'cid' from URL parameters\n                var urlParams = new URLSearchParams(window.location.search);\n                if (urlParams.has('cid')) {\n                    cid = urlParams.get('cid');\n                }\n\n                \/\/ 2. If not in URL, try to get 'cid' from localStorage\n                if (!cid) {\n                    try {\n                    cid = localStorage.getItem('salesforce_campaign_id');\n                    } catch (e) {\n                    \/\/ Handle localStorage errors\n                    }\n                }\n\n                \/\/ 3. If not in localStorage, try to get 'cid' from cookies\n                if (!cid) {\n                    var value = \"; \" + document.cookie;\n                    var parts = value.split(\"; salesforce_campaign_id=\");\n                    if (parts.length === 2) {\n                    cid = parts.pop().split(\";\").shift();\n                    }\n                }\n\n                return cid;\n                }\n\n            var cid = getCID(); \/\/ Retrieve the cid value\n\n       \n            if(cid == null){\n                cid = \"701PZ00000IlEYNYA3\"\n                \n            }\n          \n            <\/script>\n<section class=\"u-section u-section--content   is-gray \" data-block=\"content\">\n\n    <div class=\"u-wrapper u-wrapper--normal\">\n        <div class=\"content-hld\" data-aos=\"fade-in\">\n\n                        <p class=\"content__subtitle u-subtitle\">SAP THREAT DETECTION <\/p>\n            \n                        <h2 class=\"content__title u-title u-title--normal\">Risiken reduzieren und Angriffe rechtzeitig erkennen<\/h2>\n            \n                                    <div class=\"content__content u-content\">\n                <p>IT-Sicherheitsteams fehlt es oftmals an Transparenz und notwendigen Informationen, um proaktiv auf potenzielle Gefahren reagieren zu k\u00f6nnen. Denn die Erkennung von Angriffen auf Basis von Logfiles und die Analyse des Netzwerkverkehrs erfordern fundierte Kenntnisse \u00fcber Angriffswege und -muster. Zus\u00e4tzlich m\u00fcssen aus der F\u00fclle der Daten nur die sicherheitsrelevanten Ereignisse herausgefiltert und in den richtigen Kontext gesetzt werden.<\/p>\n<p><strong>Die Pathlock Threat Detection-L\u00f6sung<\/strong> bietet einen gezielten \u00dcberblick in die aktuelle Bedrohungslage und gew\u00e4hrleistet eine kontinuierliche \u00dcberwachung, die erforderlich ist, um in- und externe Gefahren fr\u00fchzeitig zu erkennen. Dazu geh\u00f6ren die Systemkonfiguration, ebenso wie Zugriffe und Berechtigungen, Sicherheits- und \u00c4nderungsprotokolle oder unerw\u00fcnschte Downloads aus den SAP-Systemen. Denn die Reaktionszeit hat in kritischen Situationen einen erheblichen Einfluss auf das Schadensausma\u00df.<\/p>\n<p>Durch die Integration mit einem \u00fcbergreifenden SIEM-Tool konsolidieren Sie alle sicherheitsrelevanten Vorf\u00e4lle Ihrer SAP ERP- und S\/4HANA-Systeme mit anderen relevanten IT-Systemen. So erhalten Sie auf Knopfdruck eine Dashboard-basierte Darstellung Ihres gesamten Security-Levels.<\/p>\n            <\/div>\n            \n            \n        <\/div>\n\n    <\/div>\n\n    \n<\/section>\n\n\n\n            <script>\n            \/\/ Function to get the 'cid' from URL parameters, cookies, or localStorage\n            function getCID() {\n                var cid = null;\n\n                \/\/ 1. Try to get 'cid' from URL parameters\n                var urlParams = new URLSearchParams(window.location.search);\n                if (urlParams.has('cid')) {\n                    cid = urlParams.get('cid');\n                }\n\n                \/\/ 2. If not in URL, try to get 'cid' from localStorage\n                if (!cid) {\n                    try {\n                    cid = localStorage.getItem('salesforce_campaign_id');\n                    } catch (e) {\n                    \/\/ Handle localStorage errors\n                    }\n                }\n\n                \/\/ 3. If not in localStorage, try to get 'cid' from cookies\n                if (!cid) {\n                    var value = \"; \" + document.cookie;\n                    var parts = value.split(\"; salesforce_campaign_id=\");\n                    if (parts.length === 2) {\n                    cid = parts.pop().split(\";\").shift();\n                    }\n                }\n\n                return cid;\n                }\n\n            var cid = getCID(); \/\/ Retrieve the cid value\n\n       \n            if(cid == null){\n                cid = \"701PZ00000IlEYNYA3\"\n                \n            }\n          \n            <\/script>\n<section class=\"u-section u-section--content    is-gray-gradient\" data-block=\"content\">\n\n    <div class=\"u-wrapper u-wrapper--normal\">\n        <div class=\"content-hld\" data-aos=\"fade-in\">\n\n                        <p class=\"content__subtitle u-subtitle\">Intelligente Erweiterung der Threat Detection<\/p>\n            \n                        <h2 class=\"content__title u-title u-title--normal\">Threat Intelligence &#8211; der strategisch entscheidende Schritt nach vorne<\/h2>\n            \n                                    <div class=\"content__content u-content\">\n                <p>Mit unserer <strong>Threat Intelligence<\/strong> gehen wir noch einen Schritt weiter und integrieren automatisierte Prozesse, die auf Ihre jeweilige Risikosituation abgestimmt sind und f\u00fcr Ihre IT-Systeme eine zus\u00e4tzliche Sicherheitsebene bilden. So k\u00f6nnen Sie beispielsweise Zugriffe auf kritische Programme auf Basis bekannter Bedrohungen bei Bedarf einschr\u00e4nken oder sogar ganz blockieren, <a href=\"https:\/\/pathlock.com\/de\/data-masking\/\" target=\"_blank\" rel=\"noopener\">Datenfelder attributbasiert maskieren<\/a>, Downloads verhindern oder Benutzer mit kritischem Verhalten von Ihren Systemen ausschlie\u00dfen. Die Risikobewertung erfolgt dabei vollautomatisch, in Echtzeit und rund um die Uhr. So verlieren Sie keine wertvolle Zeit mehr, bis erste Gegenma\u00dfnahmen greifen.<\/p>\n            <\/div>\n            \n                        <div class=\"content__btn-hld u-btn-hld\">\n\n                                <a class=\"content__btn u-btn u-btn--normal\" href=\"https:\/\/pathlock.com\/de\/kontakt\/\" target=\"_blank\">\n                    <span class=\"text\">Weitere Infos anfordern<\/span>\n                <\/a>\n                \n                \n            <\/div>\n            \n        <\/div>\n\n    <\/div>\n\n    \n<\/section>\n\n\n\n\n<section class=\"u-section u-section--tile-grid js-scrolled-element\" data-block=\"tile-grid\" data-aos=\"fade-in\" data-aos=\"fade-in\" data-anchor=\"form-scroll\">\n\n\t<div class=\"u-wrapper u-wrapper--big\" >\n\n                <h2 class=\"tile-grid__title u-title u-title--normal\">\n            Ihre Vorteile auf einen Blick        <\/h2>\n        \n                <div class=\"tile-grid__list four-col\">\n\n                                    <div class=\"tile-grid__item\">\n     \n                                                <div class=\"tile-grid__item-title\">\n                    Bedrohungen in Echtzeit erkennen                 <\/div>\n                \n                                <div class=\"text\">\n                    Security-Status Ihrer gesamten Systemlandschaft auf Knopfdruck, ohne zus\u00e4tzliche Hardware. Kumulierte Informationen bei Verletzungen Ihrer Security Policy.\r\n                <\/div>\n                                            <\/div>\n                                    <div class=\"tile-grid__item\">\n     \n                                                <div class=\"tile-grid__item-title\">\n                    Kontinuierliches Monitoring                 <\/div>\n                \n                                <div class=\"text\">\n                    Permanente \u00dcberwachung Ihrer Systemkonfiguration, Berechtigungen, Sicherheits- und \u00c4nderungsprotokolle sowie von unerw\u00fcnschten Downloads aus Ihren SAP-Systemen.                 <\/div>\n                                            <\/div>\n                                    <div class=\"tile-grid__item\">\n     \n                                                <div class=\"tile-grid__item-title\">\n                    KI-gest\u00fctzte sofortige Reaktionen                <\/div>\n                \n                                <div class=\"text\">\n                    Intelligente Automatisierung und Alarmierung in Risikosituationen. Unmittelbarer, zielgerichteter Schutz Ihrer hochsensiblen Daten und individuell konfigurierbares Regelwerk.                <\/div>\n                                            <\/div>\n                                    <div class=\"tile-grid__item\">\n     \n                                                <div class=\"tile-grid__item-title\">\n                    Nahtlose SIEM-Integration                <\/div>\n                \n                                <div class=\"text\">\n                    Zentralisierte und \u00fcbersichtliche Verwaltung Ihrer gesamten Sicherheitsarchitektur durch Integrationsm\u00f6glichkeit in eine \u00fcbergreifende SIEM-SOAR-L\u00f6sung. \r\n\r\n                <\/div>\n                                            <\/div>\n            \n        <\/div>\n        \n\n\n    <\/div>\n\n<\/section>\n\n\n\n    \n    <section\n            class=\"u-section u-section--testimonial-quote-centered u-section--testimonial-quote-centered--white\"\n            data-block=\"testimonial-quote-centered\" data-aos=\"fade-in\">\n\n        <div class=\"u-wrapper u-wrapper--normal\">\n\n            <div class=\"testimonial-quote-centered\">\n\n                <div class=\"testimonial-quote-centered__quote testimonial-quote-centered__quote--left\">\n                    <svg class=\"svg-quote-light\">\n                        <use xlink:href=\"#svg-quote-light\"><\/use>\n                    <\/svg>\n                <\/div>\n\n                <div class=\"testimonial-quote-centered__quote testimonial-quote-centered__quote--right\">\n                    <svg class=\"svg-quote-light\">\n                        <use xlink:href=\"#svg-quote-light\"><\/use>\n                    <\/svg>\n                <\/div>\n\n                <div class=\"testimonial-quote-centered__quote testimonial-quote-centered__quote--dark\">\n                    <svg class=\"svg-quote-dark\">\n                        <use xlink:href=\"#svg-quote-dark\"><\/use>\n                    <\/svg>\n                <\/div>\n\n                                    <h2 class=\"testimonial-quote-centered__title u-title u-title--normal\">Synergien der SAP Security <\/h2>\n                \n                                    <div class=\"testimonial-quote-centered__content u-content\">\n                        <p><span class=\"ui-provider gt b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">Leider werden Threat Detection, also die Erkennung von Bedrohungen in Echtzeit, und die Analyse von S<\/span><span class=\"ui-provider gt b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">chwachstellen, das<a href=\"https:\/\/pathlock.com\/de\/vulnerability-management\/\" rel=\"noopener\"> Vulnerability Management,<\/a> in Unternehmen noch zu oft getrennt betrachtet. Dabei erm\u00f6glicht die Synergie eine deutliche Verbesserung f\u00fcr die Systemsicherheit.<\/span><\/p>\n                    <\/div>\n                \n                \n                                    <span class=\"testimonial-quote-centered__source\">Raphael Kelbert, Product Management <\/span>\n                \n                \n            <\/div>\n\n        <\/div>\n\n    <\/section>\n\n\n\n\n\n<section class=\"u-section u-section--content is-centered gray-bg-img\" data-block=\"content\">\n\n    <div class=\"u-wrapper u-wrapper--normal\">\n\n        <div class=\"content-hld is-centered cta-gray-hld\" data-aos=\"fade-in\">\n\n                                                <div class=\"content__photo\" data-aos=\"fade-in\">\n                        <img class=\"js-lazy\" data-src=\"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/03\/SAP-Threat-Detection.png\" alt=\"SAP Threat Detection\" \/>\n                    <\/div>\n                            \n                            <h2 class=\"content__title u-title u-title--normal\">Threat Detection bleibt im SAP-Umfeld eine Herausforderung<\/h2>\n            \n                            <div class=\"content__content u-content\">\n                    <p>Erfahren Sie von unserem Security-Experten, welche Prozesse es bei der SAP-Absicherung zu beachten gilt, wie Sie die verschiedenen Herausforderungen l\u00f6sen und potenzielle Bedrohungen schnell und pr\u00e4zise erkennen k\u00f6nnen.<\/p>\n                <\/div>\n            \n                            <div class=\"content__btn-hld u-btn-hld\">\n                    <a class=\"content__btn u-btn u-btn--normal\" href=\"https:\/\/pathlock.com\/de\/threat-detection-bleibt-im-sap-umfeld-eine-herausforderung\/\" target=\"_blank\">\n                        <span class=\"text\">Blogbeitrag lesen<\/span>\n                    <\/a>\n                <\/div>\n            \n        <\/div>\n\n    <\/div>\n\n<\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":39,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":true,"content-type":"","footnotes":""},"class_list":["post-33440","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Threat Detection | Cyberangriffe in Echtzeit erkennen<\/title>\n<meta name=\"description\" content=\"Unsere SAP Threat Detection-L\u00f6sung bietet einen gezielten \u00dcberblick auf die aktuelle Bedrohungslage und eine kontinuierliche \u00dcberwachung.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pathlock.com\/de\/threat-detection\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Threat Detection | Cyberangriffe in Echtzeit erkennen\" \/>\n<meta property=\"og:description\" content=\"Unsere SAP Threat Detection-L\u00f6sung bietet einen gezielten \u00dcberblick auf die aktuelle Bedrohungslage und eine kontinuierliche \u00dcberwachung.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pathlock.com\/de\/threat-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"Pathlock\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-09T14:39:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pathlock.com\/wp-content\/uploads\/2025\/06\/OpenGraph-Pathlock-Logo.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"SAP Threat Detection | Cyberangriffe in Echtzeit erkennen\" \/>\n<meta name=\"twitter:description\" content=\"Unsere SAP Threat Detection-L\u00f6sung bietet einen gezielten \u00dcberblick auf die aktuelle Bedrohungslage und eine kontinuierliche \u00dcberwachung.\" \/>\n<meta name=\"twitter:site\" content=\"@pathlock\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/threat-detection\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/threat-detection\\\/\",\"name\":\"SAP Threat Detection | Cyberangriffe in Echtzeit erkennen\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#website\"},\"datePublished\":\"2023-06-13T14:05:09+00:00\",\"dateModified\":\"2026-04-09T14:39:16+00:00\",\"description\":\"Unsere SAP Threat Detection-L\u00f6sung bietet einen gezielten \u00dcberblick auf die aktuelle Bedrohungslage und eine kontinuierliche \u00dcberwachung.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/threat-detection\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pathlock.com\\\/de\\\/threat-detection\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/threat-detection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threat Detection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\",\"name\":\"Pathlock\",\"description\":\"The Leader in Application Security and Controls Automation\",\"publisher\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pathlock.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#organization\",\"name\":\"Pathlock, Inc\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"contentUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"width\":460,\"height\":148,\"caption\":\"Pathlock, Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/pathlock\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pathlock\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCgo4izMJ70K4gnyWQ_mP-OA\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Threat Detection | Cyberangriffe in Echtzeit erkennen","description":"Unsere SAP Threat Detection-L\u00f6sung bietet einen gezielten \u00dcberblick auf die aktuelle Bedrohungslage und eine kontinuierliche \u00dcberwachung.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pathlock.com\/de\/threat-detection\/","og_locale":"de_DE","og_type":"article","og_title":"SAP Threat Detection | Cyberangriffe in Echtzeit erkennen","og_description":"Unsere SAP Threat Detection-L\u00f6sung bietet einen gezielten \u00dcberblick auf die aktuelle Bedrohungslage und eine kontinuierliche \u00dcberwachung.","og_url":"https:\/\/pathlock.com\/de\/threat-detection\/","og_site_name":"Pathlock","article_modified_time":"2026-04-09T14:39:16+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/pathlock.com\/wp-content\/uploads\/2025\/06\/OpenGraph-Pathlock-Logo.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_title":"SAP Threat Detection | Cyberangriffe in Echtzeit erkennen","twitter_description":"Unsere SAP Threat Detection-L\u00f6sung bietet einen gezielten \u00dcberblick auf die aktuelle Bedrohungslage und eine kontinuierliche \u00dcberwachung.","twitter_site":"@pathlock","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pathlock.com\/de\/threat-detection\/","url":"https:\/\/pathlock.com\/de\/threat-detection\/","name":"SAP Threat Detection | Cyberangriffe in Echtzeit erkennen","isPartOf":{"@id":"https:\/\/pathlock.com\/de\/#website"},"datePublished":"2023-06-13T14:05:09+00:00","dateModified":"2026-04-09T14:39:16+00:00","description":"Unsere SAP Threat Detection-L\u00f6sung bietet einen gezielten \u00dcberblick auf die aktuelle Bedrohungslage und eine kontinuierliche \u00dcberwachung.","breadcrumb":{"@id":"https:\/\/pathlock.com\/de\/threat-detection\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pathlock.com\/de\/threat-detection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/pathlock.com\/de\/threat-detection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pathlock.com\/de\/"},{"@type":"ListItem","position":2,"name":"Threat Detection"}]},{"@type":"WebSite","@id":"https:\/\/pathlock.com\/de\/#website","url":"https:\/\/pathlock.com\/de\/","name":"Pathlock","description":"The Leader in Application Security and Controls Automation","publisher":{"@id":"https:\/\/pathlock.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pathlock.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/pathlock.com\/de\/#organization","name":"Pathlock, Inc","url":"https:\/\/pathlock.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/pathlock.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","contentUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","width":460,"height":148,"caption":"Pathlock, Inc"},"image":{"@id":"https:\/\/pathlock.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/pathlock","https:\/\/www.linkedin.com\/company\/pathlock","https:\/\/www.youtube.com\/channel\/UCgo4izMJ70K4gnyWQ_mP-OA"]}]}},"ACF":false,"_links":{"self":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/pages\/33440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/comments?post=33440"}],"version-history":[{"count":0,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/pages\/33440\/revisions"}],"wp:attachment":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/media?parent=33440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}