Glossar

IT-Begriffe sind oft komplex, vielschichtig und nicht immer selbsterklärend.

consulting-two-women-smiling-writing

Unser IT-Glossar schafft Klarheit

Wir erklären zentrale Begriffe aus den Bereichen Enterprise Service Management (ESM), Wissensmanagement, IT-Finanzmanagement (ITFM) sowie IT-Infrastruktur – von Security über Data bis Endpoint Management. Verständlich, kompakt und praxisnah – für IT-Entscheider, Service Manager und IT-Teams, die einen schnellen und verlässlichen Überblick suchen.

A

Availability Management
Go to entry
Adversary Intelligence
Go to entry
Attack Surface Management
Go to entry
AI in Cybersecurity
Go to entry
Agentic SOC
Go to entry

B

Breach Prevention
Go to entry

C

Continual Service Improvement (CSI)
Go to entry
Change Management (Änderungsmanagement)
Go to entry
Change Advisory Board (CAB)
Go to entry
Configuration Management Database (CMDB)
Go to entry
Cloud Detection and Response (CDR)
Go to entry
Cyber Threat Landscape
Go to entry
Cloud Security
Go to entry
Cyber Resilience
Go to entry
Cyber Risk Management
Go to entry

D

Data Protection
Go to entry
Digital Forensics
Go to entry

E

Eskalationsmanagement
Go to entry
Enterprise Service Management (ESM)
Go to entry
Endpoint Security
Go to entry
Endpoint Detection and Response (EDR)
Go to entry
Extended Detection and Response (XDR)
Go to entry

F

First Contact Resolution (FCR)
Go to entry
First-Level-Support (1st Level Support)
Go to entry

H

Helpdesk
Go to entry

I

IT-Service-Management (ITSM)
Go to entry
IT-Asset-Management (ITAM)
Go to entry
ITIL (Information Technology Infrastructure Library)
Go to entry
Incident Management (Störungsmanagement)
Go to entry
ITSM-Software (ITSM-Tool)
Go to entry
IT Operations Management (ITOM)
Go to entry
Identity Security
Go to entry
Incident Response
Go to entry
Insider Threat
Go to entry

K

Künstliche Intelligenz (KI) im ITSM
Go to entry
Key Performance Indicator (KPI)
Go to entry

M

Mean Time to Resolution (MTTR)
Go to entry
Managed Detection and Response (MDR)
Go to entry
MITRE ATT&CK
Go to entry
Mean Time to Detect (MTD)
Go to entry
Mean Time to Response (MTR)
Go to entry
MITRE Framework
Go to entry

N

Next-Gen SIEM
Go to entry

P

Prozessautomatisierung (ITSM-Automatisierung)
Go to entry
Problem Management (Problemmanagement)
Go to entry

R

Release Management (Releasemanagement)
Go to entry
Ransomware Protection
Go to entry

S

Self-Service-Portal
Go to entry
Service Owner
Go to entry
Service Request Management
Go to entry
Second-Level-Support (2nd Level Support)
Go to entry
Service Desk
Go to entry
Servicekatalog (Service Catalog)
Go to entry
Service Level Management (SLM)
Go to entry
Security Operations Center (SOC)
Go to entry
SaaS Security
Go to entry
Security Orchestration, Automation and Response (SOAR)
Go to entry
Service Level Agreement (SLA)
Go to entry
Security Analytics
Go to entry
Security Automation
Go to entry
SOC Modernisierung (SOC Modernization)
Go to entry
Security Posture
Go to entry

T

Ticketing-System (Ticketsystem)
Go to entry
Threat Intelligence
Go to entry
Threat Hunting
Go to entry
Threat Actor
Go to entry

V

Vulnerability Management
Go to entry

W

Workaround (Umgehungslösung)
Go to entry
Wissensmanagement (Knowledge Management)
Go to entry
Wissensdatenbank (Knowledge Base)
Go to entry

X

XIoT Security
Go to entry

Z

Zero Trust Security
Go to entry
Zero-Day Exploit
Go to entry