{"id":32498,"date":"2023-02-18T07:18:22","date_gmt":"2023-02-18T15:18:22","guid":{"rendered":"https:\/\/pathlock.com\/?post_type=resource&#038;p=32498"},"modified":"2024-06-17T05:35:20","modified_gmt":"2024-06-17T12:35:20","slug":"webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten","status":"publish","type":"resource","link":"https:\/\/pathlock.com\/de\/resource\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\/","title":{"rendered":"Attributbasiertes Data Masking: So verbessern Sie den Schutz Ihrer sensiblen Daten wirkungsvoll"},"content":{"rendered":"\n<p>SAP-Anwendungen enthalten gro\u00dfe Mengen sensibler Daten: von personenbezogenen bis hin zu Finanzinformationen. Eine gezielte oder auch versehentliche Offenlegung dieser Daten bietet somit eine potenzielle Angriffsfl\u00e4che. Loggt sich jemand aus dem Ausland mit dem User eines Konstrukteurs aus Deutschland ein, sollte dieser besser keine unternehmensrelevanten Zeichnungen sehen k\u00f6nnen. Ein Lagerist muss oftmals nicht zwingend wissen, welchen Inhalt welches Paket hat und ein Vertriebsmitarbeiter sollte f\u00fcr Angebote zwar das richtige Produkt und die Verpackungseinheit finden, jedoch nicht unbedingt die Einkaufspreise erkennen. Beim Data Masking geht es also um den Schutz Ihrer Daten, die da sind und auch notwendig, die aber nicht jeder in jeder Situation sehen sollte.<\/p>\n\n\n\n<p>Klassische, statische Maskierungsrichtlinien \u00fcber Berechtigungskonzepte ber\u00fccksichtigen nicht den Kontext des Zugriffsrisikos und zwingen daher zu einem Kompromiss zwischen Datensicherheit und Zug\u00e4nglichkeit. Hier setzt das Konzept des attributbasierten Data Maskings an: Es werden zus\u00e4tzlich zielgenaue dynamische Richtlinien eingesetzt, ohne dass f\u00fcr die Implementierung Anpassungen an SAP n\u00f6tig sind. So erzielen Sie eine fein abgestufte Kontrolle dar\u00fcber, welche Informationen f\u00fcr welche Benutzer in welcher Situation eingesehen werden k\u00f6nnen.<\/p>\n\n\n\n<p><strong>Schwerpunkte des Webinars:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Data Loss Prevention als weitere Schutzma\u00dfnahme Ihrer sensiblen Daten<\/li>\n\n\n\n<li>Warum ein gutes Berechtigungskonzept allein nicht ausreichend Schutz bietet<\/li>\n\n\n\n<li>Der Vorteil dynamischer Maskierungsma\u00dfnahmen gegen\u00fcber statischen<\/li>\n\n\n\n<li>Best Practice-Tipps f\u00fcr die Einschr\u00e4nkung von Ansichten nach Standort, IP-Adresse oder Zugriffszeitpunkt<\/li>\n<\/ul>\n\n\n\n<p><a href=\"Moderator:Helge Sanden, Herausgeber, it-onlinemagazin\u200b\">\u200b\u200b<\/a><strong>Moderator<\/strong>:<br>Axel Daldorf, Pre Sales, Pathlock Inc<\/p>\n\n\n\n<p><strong>Tipp: <\/strong>Lesen Sie auch den <a href=\"https:\/\/pathlock.com\/de\/attributbasiertes-data-masking-fuer-sap-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">Blogbeitrag zum Thema Data Masking<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SAP-Anwendungen enthalten gro\u00dfe Mengen sensibler Daten: von personenbezogenen bis hin zu Finanzinformationen. Eine gezielte oder auch versehentliche Offenlegung dieser Daten bietet somit eine potenzielle Angriffsfl\u00e4che. Loggt sich jemand aus dem Ausland mit dem User eines Konstrukteurs aus Deutschland ein, sollte dieser besser keine unternehmensrelevanten Zeichnungen sehen k\u00f6nnen. Ein Lagerist muss oftmals nicht zwingend wissen, welchen&#8230;<\/p>\n","protected":false},"author":59,"featured_media":32594,"parent":0,"template":"","categories":[726,759,729,762,253,732,765,735,768,738,771,545,741,774,547,744,779,714,747,717,750,720,753,723,756],"content_type":[],"topic":[438],"erp-solutions":[442],"magazines":[],"analyst-firm":[],"class_list":["post-32498","resource","type-resource","status-publish","has-post-thumbnail","hentry","category-continuous-monitoring","category-oil-gas-and-utilities","category-cyber-governance","category-referenzen-kundenprojekte","category-allgemeines","category-cyber-security-threat-detection","category-risk-management","category-data-privacy","category-sap-patch-tuesday","category-enterprise-solutions","category-security-risk-analytics","category-access-governance","category-finance-internal-controls","category-uncategorized-2","category-security-compliance","category-finance-performance-and-risk-analytics","category-vulnerability-management-2","category-access-violation-management","category-grc-regulatory-compliance","category-application-security","category-healthcare-and-life-sciences","category-banking-and-insurance","category-impact-of-financial-risk","category-company-news","category-insider-threat","topic-access-governance","erp-solutions-sap"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Data Masking und Data Loss Prevention als Schutzma\u00dfnahme<\/title>\n<meta name=\"description\" content=\"Wir zeigen Ihnen, wie sich Ihre sensiblen Daten mit Data Masking sch\u00fctzen und fein abgestuft kontrollieren lassen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pathlock.com\/de\/resource\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attributbasiertes Data Masking: So verbessern Sie den Schutz Ihrer sensiblen Daten wirkungsvoll\" \/>\n<meta property=\"og:description\" content=\"Wir zeigen Ihnen, wie sich Ihre sensiblen Daten mit Data Masking sch\u00fctzen und fein abgestuft kontrollieren lassen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pathlock.com\/de\/resource\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\/\" \/>\n<meta property=\"og:site_name\" content=\"Pathlock\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-17T12:35:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/02\/PLDE_Data-Masking-II-klein.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2510\" \/>\n\t<meta property=\"og:image:height\" content=\"1670\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@pathlock\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\\\/\",\"name\":\"Data Masking und Data Loss Prevention als Schutzma\u00dfnahme\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/PLDE_Data-Masking-II-klein.jpeg\",\"datePublished\":\"2023-02-18T15:18:22+00:00\",\"dateModified\":\"2024-06-17T12:35:20+00:00\",\"description\":\"Wir zeigen Ihnen, wie sich Ihre sensiblen Daten mit Data Masking sch\u00fctzen und fein abgestuft kontrollieren lassen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/PLDE_Data-Masking-II-klein.jpeg\",\"contentUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/PLDE_Data-Masking-II-klein.jpeg\",\"width\":2510,\"height\":1670,\"caption\":\"PLDE_Data Masking\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attributbasiertes Data Masking: So verbessern Sie den Schutz Ihrer sensiblen Daten wirkungsvoll\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\",\"name\":\"Pathlock\",\"description\":\"The Leader in Application Security and Controls Automation\",\"publisher\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pathlock.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#organization\",\"name\":\"Pathlock, Inc\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"contentUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"width\":460,\"height\":148,\"caption\":\"Pathlock, Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/pathlock\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pathlock\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCgo4izMJ70K4gnyWQ_mP-OA\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Masking und Data Loss Prevention als Schutzma\u00dfnahme","description":"Wir zeigen Ihnen, wie sich Ihre sensiblen Daten mit Data Masking sch\u00fctzen und fein abgestuft kontrollieren lassen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pathlock.com\/de\/resource\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\/","og_locale":"de_DE","og_type":"article","og_title":"Attributbasiertes Data Masking: So verbessern Sie den Schutz Ihrer sensiblen Daten wirkungsvoll","og_description":"Wir zeigen Ihnen, wie sich Ihre sensiblen Daten mit Data Masking sch\u00fctzen und fein abgestuft kontrollieren lassen.","og_url":"https:\/\/pathlock.com\/de\/resource\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\/","og_site_name":"Pathlock","article_modified_time":"2024-06-17T12:35:20+00:00","og_image":[{"width":2510,"height":1670,"url":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/02\/PLDE_Data-Masking-II-klein.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@pathlock","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pathlock.com\/de\/resource\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\/","url":"https:\/\/pathlock.com\/de\/resource\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\/","name":"Data Masking und Data Loss Prevention als Schutzma\u00dfnahme","isPartOf":{"@id":"https:\/\/pathlock.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pathlock.com\/de\/resource\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\/#primaryimage"},"image":{"@id":"https:\/\/pathlock.com\/de\/resource\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\/#primaryimage"},"thumbnailUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/02\/PLDE_Data-Masking-II-klein.jpeg","datePublished":"2023-02-18T15:18:22+00:00","dateModified":"2024-06-17T12:35:20+00:00","description":"Wir zeigen Ihnen, wie sich Ihre sensiblen Daten mit Data Masking sch\u00fctzen und fein abgestuft kontrollieren lassen.","breadcrumb":{"@id":"https:\/\/pathlock.com\/de\/resource\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pathlock.com\/de\/resource\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/pathlock.com\/de\/resource\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\/#primaryimage","url":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/02\/PLDE_Data-Masking-II-klein.jpeg","contentUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/02\/PLDE_Data-Masking-II-klein.jpeg","width":2510,"height":1670,"caption":"PLDE_Data Masking"},{"@type":"BreadcrumbList","@id":"https:\/\/pathlock.com\/de\/resource\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pathlock.com\/de\/"},{"@type":"ListItem","position":2,"name":"Attributbasiertes Data Masking: So verbessern Sie den Schutz Ihrer sensiblen Daten wirkungsvoll"}]},{"@type":"WebSite","@id":"https:\/\/pathlock.com\/de\/#website","url":"https:\/\/pathlock.com\/de\/","name":"Pathlock","description":"The Leader in Application Security and Controls Automation","publisher":{"@id":"https:\/\/pathlock.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pathlock.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/pathlock.com\/de\/#organization","name":"Pathlock, Inc","url":"https:\/\/pathlock.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/pathlock.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","contentUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","width":460,"height":148,"caption":"Pathlock, Inc"},"image":{"@id":"https:\/\/pathlock.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/pathlock","https:\/\/www.linkedin.com\/company\/pathlock","https:\/\/www.youtube.com\/channel\/UCgo4izMJ70K4gnyWQ_mP-OA"]}]}},"ACF":{"hero_image":{"ID":32594,"id":32594,"title":"PLDE_Data Masking","filename":"PLDE_Data-Masking-II-klein.jpeg","filesize":180750,"url":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/02\/PLDE_Data-Masking-II-klein.jpeg","link":"https:\/\/pathlock.com\/de\/resource\/webinar-attributbasiertes-data-masking-verbessern-sie-schutz-sensiblen-daten\/plde_data-masking-ii-klein\/","alt":"Webinar Data Masking","author":"39","description":"PLDE_Data Masking","caption":"PLDE_Data Masking","name":"plde_data-masking-ii-klein","status":"inherit","uploaded_to":32498,"date":"2023-02-21 14:21:54","modified":"2023-02-21 14:22:16","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/pathlock.com\/wp-includes\/images\/media\/default.png","width":2510,"height":1670,"sizes":{"thumbnail":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/02\/PLDE_Data-Masking-II-klein-150x150.jpeg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/02\/PLDE_Data-Masking-II-klein-300x200.jpeg","medium-width":300,"medium-height":200,"medium_large":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/02\/PLDE_Data-Masking-II-klein-768x511.jpeg","medium_large-width":768,"medium_large-height":511,"large":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/02\/PLDE_Data-Masking-II-klein-1024x681.jpeg","large-width":1024,"large-height":681,"1536x1536":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/02\/PLDE_Data-Masking-II-klein-1536x1022.jpeg","1536x1536-width":1536,"1536x1536-height":1022,"2048x2048":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/02\/PLDE_Data-Masking-II-klein-2048x1363.jpeg","2048x2048-width":2048,"2048x2048-height":1363,"menu-nav-img":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/02\/PLDE_Data-Masking-II-klein-112x112.jpeg","menu-nav-img-width":112,"menu-nav-img-height":112,"menu-nav-img-company":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/02\/PLDE_Data-Masking-II-klein-292x138.jpeg","menu-nav-img-company-width":292,"menu-nav-img-company-height":138,"big-promoted-resoruces-post":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/02\/PLDE_Data-Masking-II-klein-724x435.jpeg","big-promoted-resoruces-post-width":724,"big-promoted-resoruces-post-height":435,"small-promoted-resoruces-post":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/02\/PLDE_Data-Masking-II-klein-294x178.jpeg","small-promoted-resoruces-post-width":294,"small-promoted-resoruces-post-height":178}},"is_section_explore_industry_thought_leadership":false,"case_study":"resource","video_or_pdf_download":"video","intro_details_page":"In diesem Webinar zeigen wir Ihnen, warum ein gutes Berechtigungskonzept f\u00fcr den Schutz Ihrer sensiblen Daten allein, nicht ausreichend Schutz bietet.","youtube_embed_src":"https:\/\/www.youtube-nocookie.com\/embed\/kdnoRo1caGA","video_cover":false,"video_duration":"34 min.","form_id":"103cee1b-79ff-4846-9272-1ea7953e3cfb","sfdc_campaign_id":""},"_links":{"self":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/resource\/32498","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/users\/59"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/media\/32594"}],"wp:attachment":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/media?parent=32498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/categories?post=32498"},{"taxonomy":"content_type","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/content_type?post=32498"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/topic?post=32498"},{"taxonomy":"erp-solutions","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/erp-solutions?post=32498"},{"taxonomy":"magazines","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/magazines?post=32498"},{"taxonomy":"analyst-firm","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/analyst-firm?post=32498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}