A Advanced Persistent Threats SAP Archivierung B SAP Basis SAP Batch-Input SAP Berechtigungen SAP Berechtigungskonzept SAP Berechtigungstools SAP Business Connector (BC) SAP Business Integrity Screening SAP Business Technology Platform SAP Business Technology Platform Security C Compliance Component Based Test Automation (CBTA) mit SAP Solution Manager Confidential Computing Cyber Resilience Act (CRA) SAP Change Request Management (ChaRM) SAP Cloud ALM SAP Cloud Appliance Library (CAL) SAP Cloud Connector SAP Cloud Identity Access Governance (IAG) SAP Cloud Platform SAP Cloud Platform Integration SAP Cloud Portal Service SAP Code Vulnerability Analyzer (CVA) D DevSecOps Digital Operational Resilience Act (DORA) DoS- und DDoS-Attacken SAP DevOps E Endpoint Security SAP ERP 6.0 – Enhancement Package 8 (EHP 8) SAP EarlyWatch Alert SAP Enterprise Portal SAP Enterprise Threat Detection (ETD) F Focused Build für SAP Solution Manager Focused Solutions für SAP Solution Manager SAP Focused Run SAP for Me G SAP GRC SAP GUI SAP Gateway H SAP HANA Cockpit SAP HANA DB SAP HANA DB Sicherheit SAP Hosting I ISO 27001 ISO 27701 ISO/IEC 24760 IT Security IT-Grundschutz nach BSI-Standard IT-Risikomanagement IT-Sicherheitsgesetz 2.0 Identity and Access Management (IAM) für SAP Information Security Management System (ISMS) Informationssicherheit nach dem IT-Grundschutz Internes Kontrollsystem für SAP Intrusion Detection Systeme SAP Identity Authentication Service (IAS) SAP Identity Management SAP Identity Provisioning Service (IPS) SAP Information Lifecycle Management (ILM) SAP Installation SAP Integration Suite K KRITIS – Kritische Infrastrukturen L SAP Logs M Managed Detection and Response Multi-Faktor-Authentifizierung N NIST Cybersecurity Framework Network Detection and Response SAP NetWeaver Application Server ABAP (AS ABAP) SAP NetWeaver Application Server Java P Perimetersicherheit SAP Penetration Test SAP Process Orchestration (XI/PI/PO) Q SAP QuickViewer R Ransomware Risk Management SAP RFC-Schnittstellen S S/4HANA Berechtigungen SAP S/4HANA SAP Secure Network Communications (SNC) SAP Security SAP Security Audit Log SAP Security Automation SAP Security Operations Center (SOC) SAP Security Tools im Vergleich SAP Single Sign-On (SSO) SAP Software Download SAP Solution Manager SAP Solution Manager Monitoring SAP Solution Manager: Extended Computer Aided Test Tool (eCATT) Schadsoftware Security Orchestration, Automation and Responses (SOAR) Security by Design Social Engineering Systemvermessung / License Administration Workbench (LAW) im SAP T SAP TREX SAP Test Data Migration Server (TDMS) SAP Testautomatisierung SAP Testmanagement SAP Transport Management SAP Tricentis SAP Trust Center Threat Intelligence Tools für SAP Lizenzoptimierung im Vergleich U SAP UI Masking und UI Logging SAP Update/Upgrade W SAP Web Dispatcher SAP Web IDE SAP Workload Monitor Z SAP Zertifizierung Zentrale Benutzerverwaltung (ZBV) Zero Trust gegen Cyber-Risiken