{"id":30419,"date":"2024-10-03T07:05:54","date_gmt":"2024-10-03T05:05:54","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=20512"},"modified":"2024-11-08T05:46:13","modified_gmt":"2024-11-08T04:46:13","slug":"forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten","status":"publish","type":"post","link":"https:\/\/www.organisator.ch\/en\/operational-excellence\/2024-10-03\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/","title":{"rendered":"Forcepoint: How to prevent the cloud from becoming a drainpipe for sensitive data"},"content":{"rendered":"<figure id=\"attachment_20513\" class=\"wp-caption alignnone\" style=\"width: 680px\" aria-describedby=\"caption-attachment-20513\"><img class=\"alignnone wp-image-20513 size-full\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/10\/Forcepoint_Bild1_ps.jpg\" alt=\"Data security in the cloud\" width=\"680\" height=\"454\" \/>\r\n<figcaption id=\"caption-attachment-20513\" class=\"wp-caption-text\">To ensure compliance, companies must monitor all data movements to, from and within the cloud. (Image: www.depositphotos.com)<\/figcaption>\r\n<\/figure>\r\n<p>Data security in the cloud is increasingly becoming a critical component of companies' IT infrastructure. They are increasingly using cloud services to run applications and store data, while remote and mobile working means that ever larger parts of their workforce are accessing these cloud services from outside the company network using a wide variety of end devices. This increases the attack surface for cyber criminals and offers them new gateways.<\/p>\r\n<p>If companies lose intellectual property or personal information in the cloud, they face considerable consequences. These range from severe fines and an irreparable loss of reputation to a loss of revenue that could threaten their very existence. Cybersecurity specialist Forcepoint explains five measures that companies can take to prevent this.<\/p>\r\n<ol>\r\n\t<li><strong>Implement zero trust frameworks<\/strong><\/li>\r\n<\/ol>\r\n<p>The Zero Trust security approach aims to ensure that only trusted users can access applications that contain sensitive data. When accessing cloud services, companies can ensure this with the help of a CASB (Cloud Access Security Broker). This security tool supports multi-factor authentication (MFA) and single sign-on (SSO) and can enforce fine-grained authorizations. This ensures that only authorized users have access to certain data and applications.<\/p>\r\n<ol start=\"2\">\r\n\t<li><strong>Set up guidelines for data interactions<\/strong><\/li>\r\n<\/ol>\r\n<p>In order to protect their sensitive data in the cloud, they should define policies for this and specify which data may be uploaded to a cloud at all, for example to a GenAI platform, or which information employees may download from a cloud to BYOD devices that are not managed by central IT. Existing frameworks and standards can help them with this. Pre-defined policies can often be used to quickly and easily create appropriate guidelines for data interactions in the cloud.<\/p>\r\n<ol start=\"3\">\r\n\t<li><strong>Continuous data discovery and data classification<\/strong><\/li>\r\n<\/ol>\r\n<p>In order for companies to protect their sensitive data in the cloud, they first need to find out what data they actually have and where exactly it is located - and not just once, but on an ongoing basis, because their data is constantly being changed and expanded in the course of day-to-day business. Modern tools offer them many automated features for this. They can scan all of a company's storage locations in the cloud and use artificial intelligence to independently understand and classify the collected data.<\/p>\r\n<ol start=\"4\">\r\n\t<li><strong>Continuously monitor data interactions<\/strong><\/li>\r\n<\/ol>\r\n<p>To ensure compliance with the guidelines, companies must monitor all data movements to, from and within the cloud. They are then in a position to identify potential threats and quickly initiate countermeasures that can stop a data outflow or data protection breach. Appropriate security systems enable them to monitor all data, storage systems and access in real time and detect, limit or completely block suspicious activities such as unusual changes to data or access that deviates from normal patterns.<\/p>\r\n<ol start=\"5\">\r\n\t<li><strong>Secure all end devices<\/strong><\/li>\r\n<\/ol>\r\n<p>To close all security gaps, companies should use a security solution that enables uniform enforcement of policies from company-owned end devices to employees' BYOD devices. This can, for example, prevent employees from saving sensitive information from a cloud platform on their private end devices or moving data from a trusted cloud to an insecure cloud service.<\/p>\r\n<p>\"It is crucial for companies that their security solutions protect data in the cloud without restricting employee productivity,\" explains Fabian Gl\u00f6ser, Team Leader Sales Engineering at Forcepoint in Munich. \"That's why they should definitely use risk-adaptive systems. Such solutions are able to analyze risky behaviour and respond with measures that are appropriate to the specific context. In this way, they prevent the unwanted outflow of data without imposing the same rules and limitations on every employee.\"<\/p>\r\n<p><em>Source: <a href=\"http:\/\/www.forcepoint.com\/de\">www.forcepoint.com<\/a><\/em><\/p>\n<p class=\"syndicated-attribution\">This article originally appeared on m-q.ch - <a href=\"https:\/\/www.m-q.ch\/de\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/\" target=\"_blank\">https:\/\/www.m-q.ch\/de\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>If companies lose intellectual property or personal information in the cloud, they face considerable consequences. With the right measures for data security in the cloud, they can take reliable precautions. Forcepoint explains the five most important ones.<\/p>","protected":false},"author":58,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Datensicherheit in der Cloud","_yoast_wpseo_metadesc":"Unternehmen m\u00fcssen alle Datenbewegungen in, aus und innerhalb der Cloud \u00fcberwachen, um Richtlinien einzuhalten und Sicherheit zu gew\u00e4hrleisten.","articlekey":"","footnotes":""},"categories":[582],"tags":[922,146,418,492],"class_list":["post-30419","post","type-post","status-publish","format-standard","hentry","category-operational-excellence","tag-cloud","tag-datenschutz","tag-risikomanagement","tag-unternehmen"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Forcepoint: So wird die Cloud nicht zum Abflussrohr f\u00fcr sensible Daten - Organisator<\/title>\n<meta name=\"description\" content=\"Unternehmen m\u00fcssen alle Datenbewegungen in, aus und innerhalb der Cloud \u00fcberwachen, um Richtlinien einzuhalten und Sicherheit zu gew\u00e4hrleisten.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.organisator.ch\/en\/operational-excellence\/2024-10-03\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Forcepoint: So wird die Cloud nicht zum Abflussrohr f\u00fcr sensible Daten - Organisator\" \/>\n<meta property=\"og:description\" content=\"Unternehmen m\u00fcssen alle Datenbewegungen in, aus und innerhalb der Cloud \u00fcberwachen, um Richtlinien einzuhalten und Sicherheit zu gew\u00e4hrleisten.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.organisator.ch\/en\/operational-excellence\/2024-10-03\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/\" \/>\n<meta property=\"og:site_name\" content=\"Organisator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OrganisatorFachmagazin\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-03T05:05:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-08T04:46:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/10\/Forcepoint_Bild1_ps.jpg\" \/>\n<meta name=\"author\" content=\"Adelisa Kalajdzini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2024-10-03\\\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2024-10-03\\\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\\\/\"},\"author\":{\"name\":\"Adelisa Kalajdzini\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/2e1314a2172123f874db408d8911d3f3\"},\"headline\":\"Forcepoint: So wird die Cloud nicht zum Abflussrohr f\u00fcr sensible Daten\",\"datePublished\":\"2024-10-03T05:05:54+00:00\",\"dateModified\":\"2024-11-08T04:46:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2024-10-03\\\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\\\/\"},\"wordCount\":659,\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2024-10-03\\\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.m-q.ch\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Forcepoint_Bild1_ps.jpg\",\"keywords\":[\"Cloud\",\"Datenschutz\",\"Risikomanagement\",\"Unternehmen\"],\"articleSection\":[\"OPERATIONAL EXCELLENCE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2024-10-03\\\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2024-10-03\\\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\\\/\",\"name\":\"Forcepoint: So wird die Cloud nicht zum Abflussrohr f\u00fcr sensible Daten - Organisator\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2024-10-03\\\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2024-10-03\\\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.m-q.ch\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Forcepoint_Bild1_ps.jpg\",\"datePublished\":\"2024-10-03T05:05:54+00:00\",\"dateModified\":\"2024-11-08T04:46:13+00:00\",\"description\":\"Unternehmen m\u00fcssen alle Datenbewegungen in, aus und innerhalb der Cloud \u00fcberwachen, um Richtlinien einzuhalten und Sicherheit zu gew\u00e4hrleisten.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2024-10-03\\\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2024-10-03\\\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2024-10-03\\\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.m-q.ch\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Forcepoint_Bild1_ps.jpg\",\"contentUrl\":\"https:\\\/\\\/www.m-q.ch\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Forcepoint_Bild1_ps.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2024-10-03\\\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.organisator.ch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Forcepoint: So wird die Cloud nicht zum Abflussrohr f\u00fcr sensible Daten\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"name\":\"Organisator\",\"description\":\"Kompetent. Praxisnah. Der ORGANISATOR bereitet in 10 Ausgaben pro Jahr die wesentlichen Themen f\u00fcr F\u00fchrungskr\u00e4fte von KMU auf.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.organisator.ch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\",\"name\":\"Organisator\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"width\":800,\"height\":77,\"caption\":\"Organisator\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/OrganisatorFachmagazin\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/organisator-das-magazin-fr-kmu\",\"https:\\\/\\\/www.xing.com\\\/news\\\/pages\\\/organisator-ch-695\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGP2Sq0iWaZwT3BdIAQFYpw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/2e1314a2172123f874db408d8911d3f3\",\"name\":\"Adelisa Kalajdzini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09a397c22ac58cad6f160ee8306348599df9df58a8ede73696226897b9fa4b24?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09a397c22ac58cad6f160ee8306348599df9df58a8ede73696226897b9fa4b24?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09a397c22ac58cad6f160ee8306348599df9df58a8ede73696226897b9fa4b24?s=96&d=mm&r=g\",\"caption\":\"Adelisa Kalajdzini\"},\"url\":\"https:\\\/\\\/www.organisator.ch\\\/en\\\/author\\\/adelisa-kalajdzini\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Forcepoint: How to prevent the cloud from becoming a drainpipe for sensitive data - Organizer","description":"Companies must monitor all data movements to, from and within the cloud in order to comply with guidelines and ensure security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.organisator.ch\/en\/operational-excellence\/2024-10-03\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/","og_locale":"en_US","og_type":"article","og_title":"Forcepoint: So wird die Cloud nicht zum Abflussrohr f\u00fcr sensible Daten - Organisator","og_description":"Unternehmen m\u00fcssen alle Datenbewegungen in, aus und innerhalb der Cloud \u00fcberwachen, um Richtlinien einzuhalten und Sicherheit zu gew\u00e4hrleisten.","og_url":"https:\/\/www.organisator.ch\/en\/operational-excellence\/2024-10-03\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/","og_site_name":"Organisator","article_publisher":"https:\/\/www.facebook.com\/OrganisatorFachmagazin","article_published_time":"2024-10-03T05:05:54+00:00","article_modified_time":"2024-11-08T04:46:13+00:00","og_image":[{"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/10\/Forcepoint_Bild1_ps.jpg","type":"","width":"","height":""}],"author":"Adelisa Kalajdzini","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.organisator.ch\/operational-excellence\/2024-10-03\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/#article","isPartOf":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2024-10-03\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/"},"author":{"name":"Adelisa Kalajdzini","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/2e1314a2172123f874db408d8911d3f3"},"headline":"Forcepoint: So wird die Cloud nicht zum Abflussrohr f\u00fcr sensible Daten","datePublished":"2024-10-03T05:05:54+00:00","dateModified":"2024-11-08T04:46:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2024-10-03\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/"},"wordCount":659,"publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"image":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2024-10-03\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/10\/Forcepoint_Bild1_ps.jpg","keywords":["Cloud","Datenschutz","Risikomanagement","Unternehmen"],"articleSection":["OPERATIONAL EXCELLENCE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.organisator.ch\/operational-excellence\/2024-10-03\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/","url":"https:\/\/www.organisator.ch\/operational-excellence\/2024-10-03\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/","name":"Forcepoint: How to prevent the cloud from becoming a drainpipe for sensitive data - Organizer","isPartOf":{"@id":"https:\/\/www.organisator.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2024-10-03\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/#primaryimage"},"image":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2024-10-03\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/10\/Forcepoint_Bild1_ps.jpg","datePublished":"2024-10-03T05:05:54+00:00","dateModified":"2024-11-08T04:46:13+00:00","description":"Companies must monitor all data movements to, from and within the cloud in order to comply with guidelines and ensure security.","breadcrumb":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2024-10-03\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.organisator.ch\/operational-excellence\/2024-10-03\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.organisator.ch\/operational-excellence\/2024-10-03\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/10\/Forcepoint_Bild1_ps.jpg","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/10\/Forcepoint_Bild1_ps.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.organisator.ch\/operational-excellence\/2024-10-03\/forcepoint-so-wird-die-cloud-nicht-zum-abflussrohr-fuer-sensible-daten\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.organisator.ch\/"},{"@type":"ListItem","position":2,"name":"Forcepoint: So wird die Cloud nicht zum Abflussrohr f\u00fcr sensible Daten"}]},{"@type":"WebSite","@id":"https:\/\/www.organisator.ch\/#website","url":"https:\/\/www.organisator.ch\/","name":"Organizer","description":"Competent. Practical. In 10 issues per year, ORGANISATOR presents the essential topics for managers of SMEs.","publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.organisator.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.organisator.ch\/#organization","name":"Organizer","url":"https:\/\/www.organisator.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","width":800,"height":77,"caption":"Organisator"},"image":{"@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OrganisatorFachmagazin","https:\/\/www.linkedin.com\/showcase\/organisator-das-magazin-fr-kmu","https:\/\/www.xing.com\/news\/pages\/organisator-ch-695","https:\/\/www.youtube.com\/channel\/UCGP2Sq0iWaZwT3BdIAQFYpw"]},{"@type":"Person","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/2e1314a2172123f874db408d8911d3f3","name":"Adelisa Kalajdzini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/09a397c22ac58cad6f160ee8306348599df9df58a8ede73696226897b9fa4b24?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/09a397c22ac58cad6f160ee8306348599df9df58a8ede73696226897b9fa4b24?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09a397c22ac58cad6f160ee8306348599df9df58a8ede73696226897b9fa4b24?s=96&d=mm&r=g","caption":"Adelisa Kalajdzini"},"url":"https:\/\/www.organisator.ch\/en\/author\/adelisa-kalajdzini\/"}]}},"_links":{"self":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/30419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/users\/58"}],"replies":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/comments?post=30419"}],"version-history":[{"count":3,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/30419\/revisions"}],"predecessor-version":[{"id":31835,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/30419\/revisions\/31835"}],"wp:attachment":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/media?parent=30419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/categories?post=30419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/tags?post=30419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}