{"id":28547,"date":"2017-09-25T08:00:34","date_gmt":"2017-09-25T06:00:34","guid":{"rendered":"http:\/\/e3mag.com\/?p=28547"},"modified":"2024-01-19T14:52:55","modified_gmt":"2024-01-19T13:52:55","slug":"risk-m2m-communication","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/risk-m2m-communication\/","title":{"rendered":"M2M communication risk"},"content":{"rendered":"<p>M2M communication riskSpecific on-premise and cloud solutions from third-party providers today extend the scope of ERP systems in an uncomplicated way. The SAP ecosystem, for example, has numerous data transfer mechanisms for connecting any application.<\/p>\n<h3>Gateway for cyber attacks<\/h3>\n<p>The cross-application integrated IT architecture creates new challenges for IT security and documentation: The data streams that are exchanged between SAP and non-SAP applications in the background, and thus without the user's intervention, are an underestimated gateway for cyber attacks.<\/p><div id=\"great-1674569755\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>In addition, the new EU General Data Protection Regulation (GDPR) requires accurate knowledge of the current location, use and processing of personal data across all applications.<\/p>\n<h3>Data Protection Regulation<\/h3>\n<p>In order to protect business-critical data and meet the requirements of the EU GDPR, continuous monitoring and control of machine-to-machine (M2M) communication will become the central task of the IT department in the future.<\/p>\n<p>To do this, companies need intelligent solutions, such as Halocore from Secude, which are integrated directly into SAP and support common protocols such as RFC or web service.<\/p>\n<p>They should document exactly which data volumes are transferred how frequently via which system accesses or batch processes and automatically alert those responsible in the event of unusual data outflows.<\/p>\n<p>Combined with common security information and event management (SIEM) solutions, this creates an effective approach to gaining important insights into otherwise opaque \"shadow IT.\"<\/p>","protected":false},"excerpt":{"rendered":"<p>Increasing networking as part of the digital transformation is leading to a paradigm shift in terms of application integration and data distribution. <\/p>","protected":false},"author":38,"featured_media":28550,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[161,2,16508],"tags":[39,7622,11281,73,369,4386],"coauthors":[19920],"class_list":["post-28547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-szene","category-sap-nachrichten","category-mag-1709","tag-cloud","tag-datenschutzgrundverordnung","tag-dsgvo","tag-erp","tag-it","tag-on-premise","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",400,199,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-768x382.jpg",768,382,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-100x50.jpg",100,50,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-480x239.jpg",480,239,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-640x318.jpg",640,318,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-720x358.jpg",720,358,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-960x477.jpg",960,477,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",18,9,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",1000,497,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",600,298,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819.jpg",600,298,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_487108819-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Die zunehmende Vernetzung im Rahmen der digitalen Transformation f\u00fchrt zu einem Paradigmenwechsel in Bezug auf Applikationsintegration und Datenverteilung. <\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/scene\/\" rel=\"category tag\">Szene<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/sap-news\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-1709\/\" rel=\"category tag\">MAG 17-09<\/a>","author_info_v2":{"name":"E-3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/28547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=28547"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/28547\/revisions"}],"predecessor-version":[{"id":138232,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/28547\/revisions\/138232"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/28550"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=28547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=28547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=28547"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=28547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}