{"id":25897,"date":"2017-07-25T14:53:33","date_gmt":"2017-07-25T12:53:33","guid":{"rendered":"http:\/\/e3mag.com\/?p=25897"},"modified":"2024-01-19T14:53:22","modified_gmt":"2024-01-19T13:53:22","slug":"risque-sap-exportations","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/risque-sap-exportations\/","title":{"rendered":"Risque des exportations SAP"},"content":{"rendered":"<p>Alors qu'il suffisait jusqu'\u00e0 pr\u00e9sent de contr\u00f4ler l'acc\u00e8s aux diff\u00e9rents silos de donn\u00e9es, il s'agit d\u00e9sormais de s\u00e9curiser les donn\u00e9es elles-m\u00eames \u00e0 travers toutes les \u00e9tapes du processus et les applications.<\/p>\n<p>Les ruptures de m\u00e9dias compliquent toutefois la mise en \u0153uvre de tels concepts de s\u00e9curit\u00e9 globaux. Il n'y a pas d'int\u00e9gration standard entre le concept d'autorisation SAP, qui s'arr\u00eate comme chacun sait aux limites du syst\u00e8me SAP, et la solution de s\u00e9curit\u00e9 de Microsoft Azure Information Protection (AIP, anciennement RMS).<\/p>\n<p>Rien qu'en faisant un simple copier-coller ou en transmettant un export Excel par e-mail, des donn\u00e9es SAP structur\u00e9es se transforment rapidement et \u00e0 l'insu de tous en documents Microsoft Office non structur\u00e9s, sans aucun contr\u00f4le d'acc\u00e8s.<\/p>\n<p>Secude Halocore contr\u00f4le toutes les fonctions d'exportation SAP et est la seule solution de s\u00e9curit\u00e9 informatique au monde \u00e0 combiner les concepts de s\u00e9curit\u00e9 de SAP avec ceux de Microsoft.<\/p>\n<p>Gr\u00e2ce \u00e0 la classification contextuelle Halocore, le besoin de protection des donn\u00e9es SAP est automatiquement d\u00e9termin\u00e9 et appliqu\u00e9 en cons\u00e9quence aux fichiers Microsoft Office.<\/p>\n<p>Ainsi, seules les exportations autoris\u00e9es qui ont \u00e9t\u00e9 crypt\u00e9es avec le mod\u00e8le AIP appropri\u00e9 quittent le syst\u00e8me SAP. En m\u00eame temps, on s'assure que seuls les utilisateurs autoris\u00e9s ont la possibilit\u00e9 d'ouvrir et de traiter les documents correspondants.<\/p>\n<p>Des technologies modernes comme Data Stream Intelligence assurent en outre une surveillance sans faille du transfert de donn\u00e9es entre les syst\u00e8mes satellites SAP et non-SAP - un autre \u00e9l\u00e9ment important pour la s\u00e9curisation des donn\u00e9es SAP sensibles.<\/p>","protected":false},"excerpt":{"rendered":"<p>Avec la mise en r\u00e9seau croissante des appareils et des applications, les exigences en mati\u00e8re de s\u00e9curit\u00e9 de l'information et de protection des donn\u00e9es ont \u00e9galement \u00e9volu\u00e9. <\/p>","protected":false},"author":38,"featured_media":25898,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[161,2,15175],"tags":[5015,1993],"coauthors":[19920],"class_list":["post-25897","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-szene","category-sap-nachrichten","category-mag-1707","tag-azure","tag-datenschutz","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",400,193,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-768x370.jpg",768,370,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-100x48.jpg",100,48,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-480x231.jpg",480,231,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-640x308.jpg",640,308,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-720x347.jpg",720,347,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-960x463.jpg",960,463,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",18,9,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",1000,482,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",600,289,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516.jpg",600,289,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/07\/shutterstock_644884516-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Mit der zunehmenden Vernetzung von Ger\u00e4ten und Applikationen haben sich auch die Anforderungen an Informationssicherheit und Datenschutz ge\u00e4ndert. <\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/categorie\/scene\/\" rel=\"category tag\">Szene<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/categorie\/sap-nouvelles\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/categorie\/mag-1707\/\" rel=\"category tag\">MAG 17-07<\/a>","author_info_v2":{"name":"Magazine E-3","url":"https:\/\/e3mag.com\/fr\/author\/e-3-magazin\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/25897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=25897"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/25897\/revisions"}],"predecessor-version":[{"id":138293,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/25897\/revisions\/138293"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/25898"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=25897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=25897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=25897"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=25897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}