{"id":1991,"date":"2016-11-24T13:50:45","date_gmt":"2016-11-24T12:50:45","guid":{"rendered":"http:\/\/e3mag.com\/?p=1991"},"modified":"2019-04-01T08:57:49","modified_gmt":"2019-04-01T06:57:49","slug":"stop-data-loss-at-source","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/stop-data-loss-at-source\/","title":{"rendered":"Stop data loss at the source"},"content":{"rendered":"<p>Whether through malicious <span id=\"urn:local-text-annotation-qgz86vy8lcsbzq35qu2w84odol1b7cvw\" class=\"textannotation disambiguated wl-thing\">Hacker<\/span> or careless own <span id=\"urn:local-text-annotation-qhpz5xcvp5kc6n656tr6ad6p44hs044k\" class=\"textannotation disambiguated wl-thing\">Employees<\/span> Caused: Catch sensitive <span id=\"urn:local-text-annotation-6bs8a03zcsb1z7vqi3lbnc8upj11if9a\" class=\"textannotation disambiguated wl-thing\">Data<\/span> into the wrong hands, have <span id=\"urn:local-text-annotation-hu68y8yh4awg14js3gqns9v9pcjdmwil\" class=\"textannotation disambiguated wl-thing\">Company<\/span> considerable financial and legal risks are to be expected.<\/p>\n<p>For example, it can be particularly costly for companies in the pharmaceutical industry if formulations for medicines end up in the hands of competitors, thereby destroying many years of research work.<\/p><div id=\"great-1144437641\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_800x100.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_800x100.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_800x100-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_800x100-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_800x100-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_800x100-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_800x100-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_800x100-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_800x100-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_800x100-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"800\" height=\"100\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>For credit institutions, the banking information of the <span id=\"urn:local-text-annotation-2arxk2l57tr0f5kfmw7qec90qicgvsqs\" class=\"textannotation disambiguated wl-thing\">Customers<\/span> The risk of unauthorized outflow of funds is particularly high, as there is a risk of damage to the company's reputation as well as claims for damages.<\/p>\n<p>Across all industries, all <span id=\"urn:local-text-annotation-bycxvdc5cy5uzcvx283o1jqung8mciab\" class=\"textannotation disambiguated wl-thing\">Company<\/span> have an increased focus on personal employee information, as unauthorized leakage can also result in legal penalties.<\/p>\n<p>Data Leak Prevention (DLP) provides a set of methods and tools for sealing potential data leaks.<\/p>\n<p><span id=\"urn:local-text-annotation-sfdlgtj8celwi1uzd0ln0eh622xu0mqv\" class=\"textannotation disambiguated wl-person\">Allen<\/span> The common feature is that they control the data flow in the corporate network at defined exit points. <span id=\"urn:local-text-annotation-4az3hg02b0ftz35tiba6aiqvsnuzckp6\" class=\"textannotation disambiguated wl-thing\">monitor<\/span> and then sound the alarm when business-critical <span id=\"urn:local-text-annotation-h0t1rxo6kl8r3g3zckn4d6plpd3qsl1l\" class=\"textannotation disambiguated wl-thing\">Information<\/span> reach the outside or have already reached it.<\/p>\n<h3>Exit points in sight<\/h3>\n<p>To achieve this, the individual DLP solutions rely on different levels of the <span id=\"urn:enhancement-279828cc-49cb-b1e3-11f2-c769d7b74ffa\" class=\"textannotation\">IT-<span id=\"urn:local-text-annotation-uwsxe493ksrphkjcvi34jqb1qp8bp1kk\" class=\"textannotation disambiguated wl-thing\">Infrastructure<\/span><\/span> an. Thus, there are tools with which <span id=\"urn:local-text-annotation-merczs60zqisd7s39qpyanb4u0nibqhe\" class=\"textannotation disambiguated wl-thing\">Company<\/span> can monitor which <span id=\"urn:local-text-annotation-s02l10z8q8n7dmu1i0ihj8wwik14oekt\" class=\"textannotation disambiguated wl-thing\">Data<\/span> from the laptops of the <span id=\"urn:local-text-annotation-hnyw9tj915cmkk58zhe2ocrtu2x7j1uj\" class=\"textannotation disambiguated wl-thing\">Employees<\/span> be stored on mobile devices, such as USB sticks.<\/p>\n<p>In <span id=\"urn:local-text-annotation-9f0xilgmzikqo4tro6h7888sto2ouzis\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-environments, there are in principle several possibilities for data flow. Thus, during the execution of a certain <span id=\"urn:local-text-annotation-fph04dz2p1tcyx8bqm23jp7if2dc5ion\" class=\"textannotation disambiguated wl-thing\">Abap<\/span>-program, the required <span id=\"urn:local-text-annotation-uwhmyuz5tddhhv0stts9nrk0efqofbqo\" class=\"textannotation disambiguated wl-thing\">Data<\/span> from the <span id=\"urn:local-text-annotation-pnwhyccmnpmhdbq2xebt0pjc08koal6n\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-database tables and read them out via different<br \/>\ncommunication channels to the users: starting with classic output lists via special <span id=\"urn:local-text-annotation-xr08ucislyciswtgncjivjdu4271qwa3\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-<span id=\"urn:local-text-annotation-ugsywun7yzctp8p47ix4xbk9rbsnqxhk\" class=\"textannotation disambiguated wl-thing\">Interfaces<\/span> to modern web services.<\/p>\n<p>To avoid data loss, <span id=\"urn:local-text-annotation-dgj7ohu4wvvskkb6c6ut9g7h4w5fsz18\" class=\"textannotation disambiguated wl-thing\">monitor<\/span> the traditional DLP approaches precisely where the communication channels end in such a way that the <span id=\"urn:local-text-annotation-06sij7kxpceu0qhevvb18kowwz2usmvw\" class=\"textannotation disambiguated wl-thing\">Data<\/span> can either be tapped by the end users or can be modified through technical <span id=\"urn:local-text-annotation-0h1plipawsz5bgss753k88wnsepjyg0b\" class=\"textannotation disambiguated wl-thing\">Interfaces<\/span> the <span id=\"urn:local-text-annotation-aun5claz0ilgwysc5szar4k7v7j3qa1a\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-system.<\/p>\n<p>Another much-used option is that <span id=\"urn:local-text-annotation-zw1loy9techtcacvrnzz84rekaayhykk\" class=\"textannotation disambiguated wl-thing\">User<\/span> from a <span id=\"urn:local-text-annotation-6lvtc7ishm995lhv10elakh59xlhdfj9\" class=\"textannotation disambiguated wl-thing\">Abap<\/span>-<span id=\"urn:local-text-annotation-togmcfa3bukrnm7kcknhbnnxduw6mw89\" class=\"textannotation disambiguated wl-thing\">Program<\/span> create an email and send the <span id=\"urn:local-text-annotation-255glgqzyrg8tl1eq44gv71eoerfurig\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-<span id=\"urn:local-text-annotation-qcsyeo0ujn8b02k2066hse50nti0ftfe\" class=\"textannotation disambiguated wl-thing\">Data<\/span> send as an attachment.<\/p>\n<p>As different as the individual technical DLP methods are, what they all have in common is that they require a great deal of effort in order to identify the critical <span id=\"urn:local-text-annotation-amyqvk6ph9iifgz9xqjqotu85r633aci\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-<span id=\"urn:local-text-annotation-346zm9k99p5n5j46ad75uhn2ipsi1tpz\" class=\"textannotation disambiguated wl-thing\">Data<\/span> and to effectively manage the multiple exit points from the corporate network. <span id=\"urn:local-text-annotation-g9xmbz6cfett566k6kfpqbkxsw5yrmb7\" class=\"textannotation disambiguated wl-thing\">monitor<\/span>.<\/p>\n<h3><span id=\"urn:local-text-annotation-jwbnuk6f4lniwx91wjgcszp72og5sbx8\" class=\"textannotation disambiguated wl-thing\">Source code<\/span>-Analysis<\/h3>\n<p>To reduce this expense, the <span id=\"urn:local-text-annotation-svky53bek5jq02qs2w23pnml1fy1s6v8\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-With the CodeProfiler tool, security provider Virtual Forge has developed a new approach that starts much earlier and is more sustainable: With the so-called static DLP-<span id=\"urn:local-text-annotation-htu3gssa1ijdphkg9wx55u8tvvkra0kk\" class=\"textannotation disambiguated wl-thing\">Analysis<\/span> the drainage channels can be made more sensitive. <span id=\"urn:local-text-annotation-u5rqqw6ffmbenn52yff94uwurqjw4858\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-<span id=\"urn:local-text-annotation-oyevdk8jwpdksvl17glar83e677435kx\" class=\"textannotation disambiguated wl-thing\">Data<\/span> already in the <span id=\"urn:local-text-annotation-r19qdlkigirpr1s4lilb8fbpydk1j7e4\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-<span id=\"urn:local-text-annotation-bp3kefdbt47vyzgx3bj8gr7gcahdcf6p\" class=\"textannotation disambiguated wl-thing\">Source code<\/span> Identify.<\/p>\n<p>In contrast to the usual reactive DLP approaches, the static DLP-.<span id=\"urn:local-text-annotation-fq4t5ezm9w553ga2alnzalg8y7ih08vj\" class=\"textannotation disambiguated wl-thing\">Analysis<\/span> thus preventive. Directly in the <span id=\"urn:local-text-annotation-ztxbtvkhnlh31rxkbbqh0rqhptwnxkrp\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-code identifies the locations that attackers use for fraudulent purposes or their own <span id=\"urn:local-text-annotation-19stv5ar5pew2rilqk8b2e6litb0qs3r\" class=\"textannotation disambiguated wl-thing\">Employees<\/span> could inadvertently use it to perform business-critical <span id=\"urn:local-text-annotation-izgui2ldfascawpmu4kvcjc33t0792oa\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-<span id=\"urn:local-text-annotation-8owoj3wubmy95gsn5ss1js1jfhzvycot\" class=\"textannotation disambiguated wl-thing\">Data<\/span> first from the database tables, then completely from the <span id=\"urn:local-text-annotation-x7opynr0i9b5pabk34e0j6bzytvjo9io\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-applications.<\/p>\n<p>Since the installation of the CodeProfiler is technically very simple, it is ready for use in a short time and the results of a <span id=\"urn:local-text-annotation-cqp1fmmm8vmatkjpevxhjuosrvsskxq9\" class=\"textannotation disambiguated wl-thing\">Analysis<\/span> are quickly available.<\/p>\n<p>At the same time, however, it must also be clarified which of the <span id=\"urn:local-text-annotation-q1tv3pg8ouf2drl88wkb2b3302i0jlo5\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-<span id=\"urn:local-text-annotation-txyl595k1vsq28lx7ebn1e5uouy8tf0k\" class=\"textannotation disambiguated wl-thing\">Information<\/span> in a <span id=\"urn:local-text-annotation-w6omwmr9k2kmk7218k7gluyzgyrhfueg\" class=\"textannotation disambiguated wl-thing\">Company<\/span> are particularly worthy of protection. Depending on the industry, these may be <span id=\"urn:local-text-annotation-v8wfiaxqjp6j180tr6qkad7yce9cnpxp\" class=\"textannotation disambiguated wl-thing\">Data<\/span> from specific areas of the company, such as finance, development, marketing or sales.<\/p>\n<p>At the same time, constantly changing statutory data protection and <span id=\"urn:local-text-annotation-izsofts221rksk4k3ypfymr5ve9mxglu\" class=\"textannotation disambiguated wl-thing\">Compliance<\/span>company-specific company agreements as well as agreements reached with the works council.<\/p>\n<p>Are the sensitive <span id=\"urn:local-text-annotation-tuevx1gyjusi748d94iqzl5tb4vw3usf\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-<span id=\"urn:local-text-annotation-jifeppwb88rsro8c6trjbilnlxz9g8ji\" class=\"textannotation disambiguated wl-thing\">Data<\/span> identified, it must be ensured that only those users can access it who have the appropriate <span id=\"urn:local-text-annotation-74j10w1ry7jlxpl0inh7agno1gahvads\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-authorizations.<\/p>\n<p>Since the classification of business-critical <span id=\"urn:local-text-annotation-dqfu4dov58srt1w8y40fqfyvjrwfdd4w\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-<span id=\"urn:local-text-annotation-wcdo46t3sern9ql1oe8yuj8iwpvfzym9\" class=\"textannotation disambiguated wl-thing\">Data<\/span> requires extensive expertise, Virtual Forge works closely with the auditing and consulting firm KPMG on DLP customer projects.<\/p>\n<p>Conversely, KPMG consultants rely on static DLP-<span id=\"urn:local-text-annotation-3cl06vogzuu0iphlrt1ypmokv1r2ctp4\" class=\"textannotation disambiguated wl-thing\">Analyses<\/span> from Virtual Forge when they become <span id=\"urn:local-text-annotation-qfkqzbl8auytaesyjfr64jjalq4z4p28\" class=\"textannotation disambiguated wl-thing\">Customers<\/span> be called, in which undesirable <span id=\"urn:local-text-annotation-u30368qjljnsd1j9wenv4idompewsdq9\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-data outflows have been detected.<\/p>\n<p>Increasingly, KPMG is also used for <span id=\"urn:local-text-annotation-wukyo3t6im8x7k8uhcqa7giu5nu15uqp\" class=\"textannotation disambiguated wl-thing\">Customers<\/span> actively seeking to anticipate such IT security incidents. For example, the specialist departments, representatives from the areas of Governance, Risk &amp; <span id=\"urn:local-text-annotation-xjnd64dkaromx1zecwcrxj3b30bndseg\" class=\"textannotation disambiguated wl-thing\">Compliance<\/span> (GRC), internal data protection officers and works councils are increasingly looking for effective DLP approaches to counter the risks of possible <span id=\"urn:local-text-annotation-sdjr18yajkdx5ezaro2bpxio1mt9fqlq\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-data loss at an early stage.<\/p>\n<p>The growing demand is motivated by the fact that in many <span id=\"urn:local-text-annotation-rh64w36021cz90bthtr9yh6edbebwqai\" class=\"textannotation disambiguated wl-thing\">Company<\/span> the number of <span id=\"urn:local-text-annotation-uie98ztgffvbibu9mydzchlf1rej3f4c\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>systems has grown so much over the years that it has often become difficult to keep track of which business-critical <span id=\"urn:local-text-annotation-0iq5zp89s6u5kvf3dmgktqat2sdl0ttr\" class=\"textannotation disambiguated wl-thing\">Data<\/span> from which SAP<span id=\"urn:local-text-annotation-78slj2ay6t5wpd36cqk5majs4s29bxic\" class=\"textannotation disambiguated wl-thing\">Programs<\/span> and - above all - in which context they are processed.<\/p>\n<p>This increases the risks that the <span id=\"urn:local-text-annotation-rwp0h9orm8l4t8rn6lku4k1m6oaeji3p\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-<span id=\"urn:local-text-annotation-kdiblt8k2t35r88wkrsrql74ly8r51df\" class=\"textannotation disambiguated wl-thing\">Data<\/span> unauthorized addressees inside and outside the <span id=\"urn:local-text-annotation-tvp8fojy9dpkkki87vxbe8ijic12fwnj\" class=\"textannotation disambiguated wl-thing\">Company<\/span> achieve.  To <span id=\"urn:local-text-annotation-dyd0rk8zz9jb2d5py2264uogg9ololye\" class=\"textannotation disambiguated wl-thing\">Customers<\/span> to facilitate collaboration on DLP projects, Virtual Forge and KPMG have combined their technology and expertise in a joint offering.<\/p>\n<p>Each project is divided into five phases:<\/p>\n<ol>\n<li>Definition of the legal and technical requirements. At the start of the project, together with the <span id=\"urn:local-text-annotation-7f10fmrhk3x1gw1dgj4rh89xtft1pr0n\" class=\"textannotation disambiguated wl-thing\">Customers<\/span> clarified which of the existing <span id=\"urn:local-text-annotation-f9rond77tih9pgl3stbndm1elelbiwa2\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-<span id=\"urn:local-text-annotation-7tko59kxftxcgj89ib9qe8gl112klmdu\" class=\"textannotation disambiguated wl-thing\">Information<\/span> are business-critical and thus particularly worthy of protection.<\/li>\n<li>Identification of the relevant data fields and <span id=\"urn:local-text-annotation-1ppfayqjb6mqb1mr49iqsg7r7ywarx6z\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-applications, which <span id=\"urn:local-text-annotation-mmgccezbav6a8bnvt0z3rgys7hl9xthw\" class=\"textannotation disambiguated wl-thing\">Data<\/span> process. This determines which <span id=\"urn:local-text-annotation-f28dzdfieicebfrpuee9cg1mx9si4jtv\" class=\"textannotation disambiguated wl-thing\">User<\/span> for the execution of which <span id=\"urn:local-text-annotation-7hrdb2crt1ipvlj0iji9ecpe8owk0wsd\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-<span id=\"urn:local-text-annotation-7yvcs4nhhid842qurhg0bx9xi2h6klnx\" class=\"textannotation disambiguated wl-thing\">Programs<\/span> authorized and whether the existing authorizations are correct. The result is a target image that differentiates between permitted and non-permitted data outflows.<\/li>\n<li>Use of the CodeProfiler. For this purpose, the business requirements are transferred into a technical language, i.e. the DLP process is parameterized. The CodeProfiler combs through the <span id=\"urn:local-text-annotation-i9t8t7hfmserearldjtl2ysm809cu2zk\" class=\"textannotation disambiguated wl-thing\">Abap<\/span>-<span id=\"urn:local-text-annotation-o8zy7imbpetfene1vru2hsbjg3oux3z3\" class=\"textannotation disambiguated wl-thing\">Source code<\/span> with search algorithms and provides an actual picture of potential data outflows.<\/li>\n<li>Comparison of the target and actual image of possible <span id=\"urn:local-text-annotation-96lrwd79mrikgn1w1heuuqgrzbz3408g\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-data outflows. In this phase, the knowledge gained through the use of the CodeProfiler is compared with the legal and technical requirements of the <span id=\"urn:local-text-annotation-afhwh1nk7m85zbt1jre4dgumrgpriiz3\" class=\"textannotation disambiguated wl-thing\">Company<\/span> compared.<\/li>\n<li>Definition of recommendations for action. As a result, the <span id=\"urn:local-text-annotation-9d1xfw3q2i16xpwm9lpmkgz9xwuuh3dl\" class=\"textannotation disambiguated wl-thing\">Company<\/span>\u00a0 concrete measures to achieve the target image and thereby prevent unauthorized <span id=\"urn:local-text-annotation-eqdhc2ok9x0n8dopl87pvqcihcqy5asn\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-to prevent data outflows. A central measure is the cleansing of the affected <span id=\"urn:local-text-annotation-yedlcysevql9368aauub5v1mk5r8yfca\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-Source codes.<\/li>\n<\/ol>\n<h3>Continuous scans recommended<\/h3>\n<p>To ensure sustainable sealing of possible <span id=\"urn:local-text-annotation-nlark8qfp7g0a3b7baij6deriadjz41n\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-data leaks, it is recommended for the <span id=\"urn:local-text-annotation-0k6q07d357p4axalmh5gh9ltwz7y8sf4\" class=\"textannotation disambiguated wl-thing\">Company<\/span>, the static DLP-<span id=\"urn:local-text-annotation-9f75ibk29liyynoq89fketf63lcgt1m8\" class=\"textannotation disambiguated wl-thing\">Analyses<\/span> apply not only once, but regularly.<\/p>\n<p>In this way, the constant new developments and adjustments within <span id=\"urn:local-text-annotation-28coca05wnpiijazffqfcslw4xm5i2d7\" class=\"textannotation disambiguated wl-organization\">SAP<\/span>-systems, additional data leakage opportunities arise that can only be detected if the scans with CodeProfiler are continuously integrated into the development and security review processes.<\/p>","protected":false},"excerpt":{"rendered":"<p>The unwanted outflow of business-critical SAP data can have threatening consequences for companies. With a joint approach from Virtual Forge and KPMG, users get to the root of the problem. <\/p>","protected":false},"author":62,"featured_media":2008,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[5,740],"tags":[174,637,618,437],"coauthors":[23909],"class_list":["post-1991","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-management","category-mag1612","tag-compliance","tag-hacker","tag-kunde","tag-mitarbeiter","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK.jpg",1772,1268,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK.jpg",400,286,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK-768x550.jpg",768,550,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK-1200x859.jpg",1200,859,true],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK-100x72.jpg",100,72,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK-480x343.jpg",480,343,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK-640x458.jpg",640,458,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK-720x515.jpg",720,515,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK-960x687.jpg",960,687,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK-1168x836.jpg",1168,836,true],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK-1440x1030.jpg",1440,1030,true],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK.jpg",1772,1268,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK-1536x1099.jpg",1536,1099,true],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK.jpg",1772,1268,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK.jpg",18,12,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK.jpg",943,675,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK.jpg",1200,859,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK.jpg",1200,859,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK.jpg",600,429,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK.jpg",600,429,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/shutterstock_128689925_CMYK-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Der unerw\u00fcnschte Abfluss gesch\u00e4ftskritischer SAP-Daten kann f\u00fcr Unternehmen bedrohliche Folgen haben. Mit einem gemeinsamen Ansatz von Virtual Forge und KPMG packen Anwender das Problem an der Wurzel. <\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/it-management\/\" rel=\"category tag\">IT-Management<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/likes1612\/\" rel=\"category tag\">MAG 16-12<\/a>","author_info_v2":{"name":"Sch\u00f6nh\u00f6fer\/Lorenz, KPMG","url":"https:\/\/e3mag.com\/en\/author\/sebastians-und-eduart-lorenz\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/1991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=1991"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/1991\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/2008"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=1991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=1991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=1991"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=1991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}