{"id":36216,"date":"2024-04-17T07:42:13","date_gmt":"2024-04-17T14:42:13","guid":{"rendered":"https:\/\/pathlock.com\/?post_type=resource&#038;p=36216"},"modified":"2024-05-29T00:09:14","modified_gmt":"2024-05-29T07:09:14","slug":"code-scanning-mehr-als-ein-entwicklertool","status":"publish","type":"resource","link":"https:\/\/pathlock.com\/de\/resource\/code-scanning-mehr-als-ein-entwicklertool\/","title":{"rendered":"Code Scanning &#8211;\u00a0mehr als ein Entwicklertool"},"content":{"rendered":"\n<p>Die Sonderstellung der Programmiersprache ABAP in der SAP-Welt birgt spezifische Sicherheitsrisiken, die unbemerkt zu einer erheblichen Gef\u00e4hrdung Ihrer Gesch\u00e4ftsprozesse f\u00fchren k\u00f6nnen. Moderne Tools und Techniken zum Scannen und Verifizieren von ABAP-Code schaffen hier Abhilfe. Um Sicherheit und Compliance l\u00fcckenlos zu gew\u00e4hrleisten, bedarf es jedoch einer strategischen Einbettung des Code Scannings in den Software-Entwicklungszyklus.<\/p>\n\n\n\n<p>In diesem Webinar erfahren Sie, wie Sie durch effektives Code Scanning einen robusten Schutzmechanismus implementieren und gleichzeitig Compliance-Richtlinien wie SOX und GDPR besser einhalten k\u00f6nnen.<\/p>\n\n\n\n<p><strong>Schwerpunkte des Webinars:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ABAP-Sicherheitsrisiken verstehen und Angriffsvektoren detailliert analysieren<\/li>\n\n\n\n<li>Bedeutung von Code Scanning und Integration in den Software-Entwicklungszyklus<\/li>\n\n\n\n<li>Strategien zur nahtlosen Einhaltung von SOX und GDPR-Vorschriften<\/li>\n\n\n\n<li>Best Practices f\u00fcr ABAP Code Security<\/li>\n<\/ul>\n\n\n\n<p><strong>Moderatoren<\/strong>:\u200b<br>Raphael Kelbert | Produktmanagement<strong>\u00a0<\/strong>|<strong>\u00a0<\/strong>Pathlock Deutschland<br>\u200bClemens G\u00fctter | Produktmanagement<strong>\u00a0<\/strong>|<strong>\u00a0<\/strong>Pathlock Deutschland<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Die Sonderstellung der Programmiersprache ABAP in der SAP-Welt birgt spezifische Sicherheitsrisiken, die unbemerkt zu einer erheblichen Gef\u00e4hrdung Ihrer Gesch\u00e4ftsprozesse f\u00fchren k\u00f6nnen. Moderne Tools und Techniken zum Scannen und Verifizieren von ABAP-Code schaffen hier Abhilfe. Um Sicherheit und Compliance l\u00fcckenlos zu gew\u00e4hrleisten, bedarf es jedoch einer strategischen Einbettung des Code Scannings in den Software-Entwicklungszyklus. In diesem&#8230;<\/p>\n","protected":false},"author":59,"featured_media":35992,"parent":0,"template":"","categories":[],"content_type":[158],"topic":[554],"erp-solutions":[1015],"magazines":[],"analyst-firm":[],"class_list":["post-36216","resource","type-resource","status-publish","has-post-thumbnail","hentry","content_type-on-demand-webinar","topic-sap-security","erp-solutions-sap-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Code Scanning \u2013 mehr als ein Entwicklertool<\/title>\n<meta name=\"description\" content=\"Wir zeigen Ihnen, wie Sie mit ausgefeilten Code Scanning-Techniken kritische Angriffsvektoren im ABAP-Code vermeiden.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pathlock.com\/de\/resource\/code-scanning-mehr-als-ein-entwicklertool\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Code Scanning \u2013 mehr als ein Entwicklertool\" \/>\n<meta property=\"og:description\" content=\"Wir zeigen Ihnen, wie Sie mit ausgefeilten Code Scanning-Techniken kritische Angriffsvektoren im ABAP-Code vermeiden.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pathlock.com\/de\/resource\/code-scanning-mehr-als-ein-entwicklertool\/\" \/>\n<meta property=\"og:site_name\" content=\"Pathlock\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-29T07:09:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/03\/CodeScanning_16-9-jpeg.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1632\" \/>\n\t<meta property=\"og:image:height\" content=\"918\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Code Scanning \u2013 mehr als ein Entwicklertool\" \/>\n<meta name=\"twitter:description\" content=\"Wir zeigen Ihnen, wie Sie mit ausgefeilten Code Scanning-Techniken kritische Angriffsvektoren im ABAP-Code vermeiden.\" \/>\n<meta name=\"twitter:site\" content=\"@pathlock\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/code-scanning-mehr-als-ein-entwicklertool\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/code-scanning-mehr-als-ein-entwicklertool\\\/\",\"name\":\"Code Scanning \u2013 mehr als ein Entwicklertool\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/code-scanning-mehr-als-ein-entwicklertool\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/code-scanning-mehr-als-ein-entwicklertool\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/CodeScanning_16-9-jpeg.webp\",\"datePublished\":\"2024-04-17T14:42:13+00:00\",\"dateModified\":\"2024-05-29T07:09:14+00:00\",\"description\":\"Wir zeigen Ihnen, wie Sie mit ausgefeilten Code Scanning-Techniken kritische Angriffsvektoren im ABAP-Code vermeiden.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/code-scanning-mehr-als-ein-entwicklertool\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/code-scanning-mehr-als-ein-entwicklertool\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/code-scanning-mehr-als-ein-entwicklertool\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/CodeScanning_16-9-jpeg.webp\",\"contentUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/CodeScanning_16-9-jpeg.webp\",\"width\":1632,\"height\":918,\"caption\":\"Hacker with computer code and hacking interface Code Scanning\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/code-scanning-mehr-als-ein-entwicklertool\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Code Scanning &#8211;\u00a0mehr als ein Entwicklertool\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\",\"name\":\"Pathlock\",\"description\":\"The Leader in Application Security and Controls Automation\",\"publisher\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pathlock.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#organization\",\"name\":\"Pathlock, Inc\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"contentUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"width\":460,\"height\":148,\"caption\":\"Pathlock, Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/pathlock\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pathlock\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCgo4izMJ70K4gnyWQ_mP-OA\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Code Scanning \u2013 mehr als ein Entwicklertool","description":"Wir zeigen Ihnen, wie Sie mit ausgefeilten Code Scanning-Techniken kritische Angriffsvektoren im ABAP-Code vermeiden.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pathlock.com\/de\/resource\/code-scanning-mehr-als-ein-entwicklertool\/","og_locale":"de_DE","og_type":"article","og_title":"Code Scanning \u2013 mehr als ein Entwicklertool","og_description":"Wir zeigen Ihnen, wie Sie mit ausgefeilten Code Scanning-Techniken kritische Angriffsvektoren im ABAP-Code vermeiden.","og_url":"https:\/\/pathlock.com\/de\/resource\/code-scanning-mehr-als-ein-entwicklertool\/","og_site_name":"Pathlock","article_modified_time":"2024-05-29T07:09:14+00:00","og_image":[{"width":1632,"height":918,"url":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/03\/CodeScanning_16-9-jpeg.webp","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Code Scanning \u2013 mehr als ein Entwicklertool","twitter_description":"Wir zeigen Ihnen, wie Sie mit ausgefeilten Code Scanning-Techniken kritische Angriffsvektoren im ABAP-Code vermeiden.","twitter_site":"@pathlock","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pathlock.com\/de\/resource\/code-scanning-mehr-als-ein-entwicklertool\/","url":"https:\/\/pathlock.com\/de\/resource\/code-scanning-mehr-als-ein-entwicklertool\/","name":"Code Scanning \u2013 mehr als ein Entwicklertool","isPartOf":{"@id":"https:\/\/pathlock.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pathlock.com\/de\/resource\/code-scanning-mehr-als-ein-entwicklertool\/#primaryimage"},"image":{"@id":"https:\/\/pathlock.com\/de\/resource\/code-scanning-mehr-als-ein-entwicklertool\/#primaryimage"},"thumbnailUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/03\/CodeScanning_16-9-jpeg.webp","datePublished":"2024-04-17T14:42:13+00:00","dateModified":"2024-05-29T07:09:14+00:00","description":"Wir zeigen Ihnen, wie Sie mit ausgefeilten Code Scanning-Techniken kritische Angriffsvektoren im ABAP-Code vermeiden.","breadcrumb":{"@id":"https:\/\/pathlock.com\/de\/resource\/code-scanning-mehr-als-ein-entwicklertool\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pathlock.com\/de\/resource\/code-scanning-mehr-als-ein-entwicklertool\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/pathlock.com\/de\/resource\/code-scanning-mehr-als-ein-entwicklertool\/#primaryimage","url":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/03\/CodeScanning_16-9-jpeg.webp","contentUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/03\/CodeScanning_16-9-jpeg.webp","width":1632,"height":918,"caption":"Hacker with computer code and hacking interface Code Scanning"},{"@type":"BreadcrumbList","@id":"https:\/\/pathlock.com\/de\/resource\/code-scanning-mehr-als-ein-entwicklertool\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pathlock.com\/de\/"},{"@type":"ListItem","position":2,"name":"Code Scanning &#8211;\u00a0mehr als ein Entwicklertool"}]},{"@type":"WebSite","@id":"https:\/\/pathlock.com\/de\/#website","url":"https:\/\/pathlock.com\/de\/","name":"Pathlock","description":"The Leader in Application Security and Controls Automation","publisher":{"@id":"https:\/\/pathlock.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pathlock.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/pathlock.com\/de\/#organization","name":"Pathlock, Inc","url":"https:\/\/pathlock.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/pathlock.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","contentUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","width":460,"height":148,"caption":"Pathlock, Inc"},"image":{"@id":"https:\/\/pathlock.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/pathlock","https:\/\/www.linkedin.com\/company\/pathlock","https:\/\/www.youtube.com\/channel\/UCgo4izMJ70K4gnyWQ_mP-OA"]}]}},"ACF":{"hero_image":{"ID":35992,"id":35992,"title":"Code Scanning Webinar Hacker","filename":"CodeScanning_16-9-jpeg.webp","filesize":271434,"url":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/03\/CodeScanning_16-9-jpeg.webp","link":"https:\/\/pathlock.com\/de\/events-webinare\/hacker-with-computer-code-and-hacking-interface-hud\/","alt":"Hacker with computer code and hacking interface Code Scanning","author":"39","description":"Code Scanning Webinar Hacker","caption":"","name":"hacker-with-computer-code-and-hacking-interface-hud","status":"inherit","uploaded_to":31950,"date":"2024-03-18 08:51:07","modified":"2024-04-17 08:33:28","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/pathlock.com\/wp-includes\/images\/media\/default.png","width":1632,"height":918,"sizes":{"thumbnail":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/03\/CodeScanning_16-9-150x150.webp","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/03\/CodeScanning_16-9-300x169.webp","medium-width":300,"medium-height":169,"medium_large":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/03\/CodeScanning_16-9-768x432.webp","medium_large-width":768,"medium_large-height":432,"large":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/03\/CodeScanning_16-9-1024x576.webp","large-width":1024,"large-height":576,"1536x1536":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/03\/CodeScanning_16-9-1536x864.webp","1536x1536-width":1536,"1536x1536-height":864,"2048x2048":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/03\/CodeScanning_16-9-jpeg.webp","2048x2048-width":1632,"2048x2048-height":918,"menu-nav-img":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/03\/CodeScanning_16-9-112x112.webp","menu-nav-img-width":112,"menu-nav-img-height":112,"menu-nav-img-company":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/03\/CodeScanning_16-9-292x138.webp","menu-nav-img-company-width":292,"menu-nav-img-company-height":138,"big-promoted-resoruces-post":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/03\/CodeScanning_16-9-724x435.webp","big-promoted-resoruces-post-width":724,"big-promoted-resoruces-post-height":435,"small-promoted-resoruces-post":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/03\/CodeScanning_16-9-294x178.webp","small-promoted-resoruces-post-width":294,"small-promoted-resoruces-post-height":178}},"is_section_explore_industry_thought_leadership":true,"case_study":"resource","video_or_pdf_download":"video","intro_details_page":"Mit ausgefeilten Code Scanning-Techniken lassen sich kritische Angriffsvektoren im ABAP-Code vermeiden. Jetzt informieren!","youtube_embed_src":"https:\/\/www.youtube-nocookie.com\/embed\/gjb-9CVbkY4","video_cover":false,"video_duration":"39 min.","form_id":"07a1dc9a-fd62-43fe-8e71-d0267db4a522","sfdc_campaign_id":""},"_links":{"self":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/resource\/36216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/users\/59"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/media\/35992"}],"wp:attachment":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/media?parent=36216"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/categories?post=36216"},{"taxonomy":"content_type","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/content_type?post=36216"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/topic?post=36216"},{"taxonomy":"erp-solutions","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/erp-solutions?post=36216"},{"taxonomy":"magazines","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/magazines?post=36216"},{"taxonomy":"analyst-firm","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/analyst-firm?post=36216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}