{"id":25897,"date":"2017-07-25T14:53:33","date_gmt":"2017-07-25T12:53:33","guid":{"rendered":"http:\/\/e3mag.com\/?p=25897"},"modified":"2024-01-19T14:53:22","modified_gmt":"2024-01-19T13:53:22","slug":"exportaciones-de-savia-de-riesgo","status":"publish","type":"post","link":"https:\/\/e3mag.com\/es\/exportaciones-de-savia-de-riesgo\/","title":{"rendered":"Riesgo Exportaciones SAP"},"content":{"rendered":"<p>Si antes bastaba con controlar el acceso a los distintos silos de datos, ahora es necesario proteger los propios datos en todas las fases del proceso y las aplicaciones.<\/p>\n<p>Sin embargo, la discontinuidad de los medios dificulta la aplicaci\u00f3n de conceptos de seguridad tan amplios. Por defecto, no existe integraci\u00f3n entre el concepto de autorizaci\u00f3n de SAP, que termina en los l\u00edmites del sistema SAP, y la soluci\u00f3n de seguridad de Microsoft Azure Information Protection (AIP, antes RMS).<\/p>\n<p>Simplemente copiando y pegando o reenviando una exportaci\u00f3n de Excel por correo electr\u00f3nico, los datos SAP estructurados se transforman r\u00e1pidamente y sin darse cuenta en documentos Microsoft Office no estructurados sin ning\u00fan control de acceso.<\/p>\n<p>Secude Halocore controla todas las funciones de exportaci\u00f3n de SAP y es la \u00fanica soluci\u00f3n de seguridad inform\u00e1tica del mundo que combina los conceptos de seguridad de SAP con los de Microsoft.<\/p>\n<p>La clasificaci\u00f3n contextual de Halocore determina autom\u00e1ticamente los requisitos de protecci\u00f3n de los datos SAP y los aplica en consecuencia a los archivos de Microsoft Office.<\/p>\n<p>Esto significa que s\u00f3lo las exportaciones autorizadas que han sido codificadas con la plantilla AIP adecuada salen del sistema SAP. Al mismo tiempo, garantiza que solo los usuarios autorizados puedan abrir y procesar los documentos correspondientes.<\/p>\n<p>Las tecnolog\u00edas modernas, como Data Stream Intelligence, tambi\u00e9n garantizan una supervisi\u00f3n sin fisuras de la transferencia de datos entre sistemas sat\u00e9lite SAP y ajenos a SAP, otro componente importante para proteger los datos confidenciales de SAP.<\/p>","protected":false},"excerpt":{"rendered":"<p>Con la creciente interconexi\u00f3n de dispositivos y aplicaciones, tambi\u00e9n han cambiado los requisitos de seguridad de la informaci\u00f3n y protecci\u00f3n de datos. <\/p>","protected":false},"author":38,"featured_media":25898,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[161,2,15175],"tags":[5015,1993],"coauthors":[19920],"class_list":["post-25897","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-szene","category-sap-nachrichten","category-mag-1707","tag-azure","tag-datenschutz","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",400,193,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-768x370.jpg",768,370,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-100x48.jpg",100,48,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-480x231.jpg",480,231,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-640x308.jpg",640,308,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-720x347.jpg",720,347,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-960x463.jpg",960,463,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",18,9,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",600,289,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",600,289,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Mit der zunehmenden Vernetzung von Ger\u00e4ten und Applikationen haben sich auch die Anforderungen an Informationssicherheit und Datenschutz ge\u00e4ndert. <\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/es\/categoria\/escena\/\" rel=\"category tag\">Szene<\/a>, <a href=\"https:\/\/e3mag.com\/es\/categoria\/noticias-sap\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/es\/categoria\/mag-1707\/\" rel=\"category tag\">MAG 17-07<\/a>","author_info_v2":{"name":"Revista E-3","url":"https:\/\/e3mag.com\/es\/author\/e-3-magazin\/"},"comments_num_v2":"0 comentarios","_links":{"self":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/25897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/comments?post=25897"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/25897\/revisions"}],"predecessor-version":[{"id":138293,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/25897\/revisions\/138293"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media\/25898"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media?parent=25897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/categories?post=25897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/tags?post=25897"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/coauthors?post=25897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}