{"id":28547,"date":"2017-09-25T08:00:34","date_gmt":"2017-09-25T06:00:34","guid":{"rendered":"http:\/\/e3mag.com\/?p=28547"},"modified":"2024-01-19T14:52:55","modified_gmt":"2024-01-19T13:52:55","slug":"risiko-m2m-kommunikation","status":"publish","type":"post","link":"https:\/\/e3mag.com\/de\/risiko-m2m-kommunikation\/","title":{"rendered":"Risiko M2M-Kommunikation"},"content":{"rendered":"<p>Risiko M2M-KommunikationSpezifische On-premise- und Cloud-L\u00f6sungen von Drittanbietern erweitern heute auf unkompliziertem Wege den Anwendungsbereich der ERP-Systeme. Das SAP-Ecosystem zum Beispiel verf\u00fcgt \u00fcber zahlreiche Datentransfermechanismen zur Anbindung beliebiger Applikationen.<\/p>\n<h3>Eingangstor f\u00fcr Cyber-Attacken<\/h3>\n<p>Durch die anwendungs\u00fcbergreifend integrierte IT-Architektur entstehen neue Herausforderungen f\u00fcr IT-Sicherheit und Dokumentation: Die Datenstr\u00f6me, die zwischen den SAP- und Non-SAP-Applikationen im Hintergrund und damit ohne das Zutun des Anwenders ausgetauscht werden, sind ein untersch\u00e4tztes Eingangstor f\u00fcr Cyber-Attacken.<\/p><div class=\"great-fullsize-content-de\" style=\"float: left;\" id=\"great-1135628513\"><div id=\"great-4234866861\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div><\/div>\n<p>Zudem verlangt die neue EU-Datenschutzgrundverordnung (DSGVO) genaue Kenntnisse \u00fcber den aktuellen Speicherort, die Nutzung und die Verarbeitung personenbezogener Daten \u00fcber alle Anwendungen hinweg.<\/p>\n<h3>Datenschutzverordnung<\/h3>\n<p>Um unternehmenskritische Daten sch\u00fctzen und die Vorgaben der EU-DSGVO erf\u00fcllen zu k\u00f6nnen, wird die kontinuierliche \u00dcberwachung und Kontrolle der Machine-to-Machine-Kommunikation (M2M) k\u00fcnftig zur zentralen Aufgabe der IT-Abteilung.<\/p>\n<p>Hierf\u00fcr ben\u00f6tigen Unternehmen intelligente L\u00f6sungen, wie zum Beispiel Halocore von Secude, die direkt in SAP integriert sind und die g\u00e4ngigen Protokolle wie RFC oder Webservice unterst\u00fctzen.<\/p>\n<p>Sie sollten genau dokumentieren, welche Datenmengen wie h\u00e4ufig \u00fcber welche Systemzug\u00e4nge oder Batchprozesse \u00fcbertragen werden und die Verantwortlichen im Falle von ungew\u00f6hnlichen Datenabfl\u00fcssen automatisch alarmieren.<\/p>\n<p>In Verbindung mit g\u00e4ngigen Sicherheits\u00adinformations- und Ereignis-Management-L\u00f6sungen (SIEM) entsteht so ein wirksamer Ansatz, um wichtige Einblicke in die sonst undurchsichtige \u201eSchatten-IT\u201c zu erhalten.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Die zunehmende Vernetzung im Rahmen der digitalen Transformation f\u00fchrt zu einem Paradigmenwechsel in Bezug auf Applikationsintegration und Datenverteilung. <\/p>\n","protected":false},"author":38,"featured_media":28550,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[161,2,16508],"tags":[39,7622,11281,73,369,4386],"coauthors":[19920],"class_list":["post-28547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-szene","category-sap-nachrichten","category-mag-1709","tag-cloud","tag-datenschutzgrundverordnung","tag-dsgvo","tag-erp","tag-it","tag-on-premise","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",400,199,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-768x382.jpg",768,382,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-100x50.jpg",100,50,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-480x239.jpg",480,239,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-640x318.jpg",640,318,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-720x358.jpg",720,358,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-960x477.jpg",960,477,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",18,9,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",600,298,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",600,298,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Die zunehmende Vernetzung im Rahmen der digitalen Transformation f\u00fchrt zu einem Paradigmenwechsel in Bezug auf Applikationsintegration und Datenverteilung. <\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/de\/category\/szene\/\" rel=\"category tag\">Szene<\/a>, <a href=\"https:\/\/e3mag.com\/de\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/de\/category\/mag-1709\/\" rel=\"category tag\">MAG 17-09<\/a>","author_info_v2":{"name":"E-3 Magazin","url":"https:\/\/e3mag.com\/de\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts\/28547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/comments?post=28547"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts\/28547\/revisions"}],"predecessor-version":[{"id":138232,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts\/28547\/revisions\/138232"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/media\/28550"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/media?parent=28547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/categories?post=28547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/tags?post=28547"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/coauthors?post=28547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}