{"id":25897,"date":"2017-07-25T14:53:33","date_gmt":"2017-07-25T12:53:33","guid":{"rendered":"http:\/\/e3mag.com\/?p=25897"},"modified":"2024-01-19T14:53:22","modified_gmt":"2024-01-19T13:53:22","slug":"risk-sap-exports","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/risk-sap-exports\/","title":{"rendered":"Risk SAP exports"},"content":{"rendered":"<p>While it was previously sufficient to control access to the individual data silos, it is now necessary to secure the data itself across all process steps and applications.<\/p>\n<p>However, media discontinuities make it difficult to implement such comprehensive security concepts. By default, there is no integration between the SAP authorization concept, which ends at the boundaries of the SAP system, and the Microsoft security solution Azure Information Protection (AIP, formerly RMS).<\/p><div id=\"great-174387083\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>Simply by copy-pasting or forwarding an Excel export by email, structured SAP data is quickly and unnoticed transformed into unstructured Microsoft Office documents without any access control.<\/p>\n<p>Secude Halocore controls all SAP export functions and is the only IT security solution in the world that combines SAP's security concepts with those of Microsoft.<\/p>\n<p>The Halocore context classification automatically determines the protection requirements of the SAP data and applies them accordingly to the Microsoft Office files.<\/p>\n<p>This means that only authorized exports that have been encrypted with the appropriate AIP template leave the SAP system. At the same time, it ensures that only authorized users are able to open and process the corresponding documents.<\/p>\n<p>Modern technologies such as Data Stream Intelligence also ensure seamless monitoring of data transfer between SAP and non-SAP satellite systems - another important component in securing sensitive SAP data.<\/p>","protected":false},"excerpt":{"rendered":"<p>With the increasing networking of devices and applications, the requirements for information security and data protection have also changed. <\/p>","protected":false},"author":38,"featured_media":25898,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[161,2,15175],"tags":[5015,1993],"coauthors":[19920],"class_list":["post-25897","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-szene","category-sap-nachrichten","category-mag-1707","tag-azure","tag-datenschutz","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",400,193,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-768x370.jpg",768,370,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-100x48.jpg",100,48,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-480x231.jpg",480,231,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-640x308.jpg",640,308,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-720x347.jpg",720,347,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-960x463.jpg",960,463,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",18,9,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",600,289,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",600,289,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Mit der zunehmenden Vernetzung von Ger\u00e4ten und Applikationen haben sich auch die Anforderungen an Informationssicherheit und Datenschutz ge\u00e4ndert. <\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/scene\/\" rel=\"category tag\">Szene<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/sap-news\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-1707\/\" rel=\"category tag\">MAG 17-07<\/a>","author_info_v2":{"name":"E-3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/25897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=25897"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/25897\/revisions"}],"predecessor-version":[{"id":138293,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/25897\/revisions\/138293"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/25898"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=25897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=25897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=25897"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=25897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}