{"id":33235,"date":"2023-05-10T06:39:53","date_gmt":"2023-05-10T13:39:53","guid":{"rendered":"https:\/\/pathlock.com\/?post_type=resource&#038;p=33235"},"modified":"2024-04-29T05:54:42","modified_gmt":"2024-04-29T12:54:42","slug":"expert-talk-ying-und-yang-der-sap-sicherheit","status":"publish","type":"resource","link":"https:\/\/pathlock.com\/de\/resource\/expert-talk-ying-und-yang-der-sap-sicherheit\/","title":{"rendered":"[Expert Talk] Ying und Yang der SAP-Sicherheit"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-threat-detection-vulnerability-management\">Threat Detection &amp; Vulnerability Management:<\/h2>\n\n\n\n<p>Wenn es um die Absicherung von SAP-Systemen geht, wird die Erkennung von Bedrohungen und die Analyse von Schwachstellen oftmals getrennt betrachtet. Doch dabei gehen wertvolle Synergieeffekte f\u00fcr die SAP-Systemsicherheit verloren.<\/p>\n\n\n\n<p>Werden Schwachstellen identifiziert und Bedrohungen in Echtzeit erkannt, erm\u00f6glicht die Zusammenf\u00fchrung beider Methoden eine optimierte Gefahrenerkennung und gleichzeitig eine reduzierte Reaktionszeit bei unerw\u00fcnschten Ereignissen \u2013  oftmals der entscheidende Faktor.\u200b<\/p>\n\n\n\n<p>Im Rahmen dieses Expertengespr\u00e4chs der IT-Onlinekonferenz 2023 wird Ihnen Ralf Kempf (Pathlock) im Gespr\u00e4ch mit Arndt Lingscheid (SAP) anhand von Beispielen vorstellen, welche Vorteile Ihnen die zielgerichtete Kombination aus Threat Detection und Vulnerability Assessment erm\u00f6glicht und so zu einer deutlichen Verbesserung Ihrer SAP-Sicherheit f\u00fchrt.<\/p>\n\n\n\n<p><em>\u201eThreat Detection ohne Schwachstellen-Analyse ist wie ein Auto ohne Bremsen &#8211; es mag schnell und effizient sein, aber ebenso unsicher&#8220;<\/em>, so Ralf Kempf (Gesch\u00e4ftsf\u00fchrung, Pathlock Deutschland).<\/p>\n\n\n\n<p><a href=\"Moderator:Helge Sanden, Herausgeber, it-onlinemagazin\u200b\">\u200b\u200b<\/a><strong>Moderator:<\/strong><br>Helge Sanden, Herausgeber, it-onlinemagazin<\/p>\n\n\n\n<p><strong>Interviewpartner<\/strong>:\u200b<br>Ralf Kempf | Gesch\u00e4ftsf\u00fchrer | Pathlock Deuschland.<br>Arndt Lingscheid | Solution Owner SAP GRC &amp; Cyber Security | SAP SE<\/p>\n\n\n\n<p>Weitere Informationen erhalten Sie in unserem <a href=\"https:\/\/pathlock.com\/de\/sap-sicherheit-vulnerability-management-und-threat-detection\/\">Blogbeitrag<\/a> und im <a href=\"https:\/\/pathlock.com\/de\/sap-security-das-ist-wie-ein-auto-ohne-bremsen\/\">Interview<\/a> mit der it security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat Detection &amp; Vulnerability Management: Wenn es um die Absicherung von SAP-Systemen geht, wird die Erkennung von Bedrohungen und die Analyse von Schwachstellen oftmals getrennt betrachtet. Doch dabei gehen wertvolle Synergieeffekte f\u00fcr die SAP-Systemsicherheit verloren. Werden Schwachstellen identifiziert und Bedrohungen in Echtzeit erkannt, erm\u00f6glicht die Zusammenf\u00fchrung beider Methoden eine optimierte Gefahrenerkennung und gleichzeitig eine reduzierte&#8230;<\/p>\n","protected":false},"author":59,"featured_media":33240,"parent":0,"template":"","categories":[],"content_type":[158],"topic":[554],"erp-solutions":[1015],"magazines":[],"analyst-firm":[],"class_list":["post-33235","resource","type-resource","status-publish","has-post-thumbnail","hentry","content_type-on-demand-webinar","topic-sap-security","erp-solutions-sap-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Expert Talk SAP Security: Ying und Yang der SAP-Sicherheit.<\/title>\n<meta name=\"description\" content=\"Erfahren Sie, welche Vorteile Ihnen die zielgerichtete Kombination aus Threat Detection und Vulnerability Management erm\u00f6glicht.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pathlock.com\/de\/resource\/expert-talk-ying-und-yang-der-sap-sicherheit\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Expert Talk SAP Security: Ying und Yang der SAP-Sicherheit.\" \/>\n<meta property=\"og:description\" content=\"Erfahren Sie, welche Vorteile Ihnen die zielgerichtete Kombination aus Threat Detection und Vulnerability Management erm\u00f6glicht.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pathlock.com\/de\/resource\/expert-talk-ying-und-yang-der-sap-sicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"Pathlock\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-29T12:54:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/ITOK-Security_Keyvisual.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Expert Talk SAP Security: Ying und Yang der SAP-Sicherheit.\" \/>\n<meta name=\"twitter:description\" content=\"Erfahren Sie, welche Vorteile Ihnen die zielgerichtete Kombination aus Threat Detection und Vulnerability Management erm\u00f6glicht.\" \/>\n<meta name=\"twitter:site\" content=\"@pathlock\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/expert-talk-ying-und-yang-der-sap-sicherheit\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/expert-talk-ying-und-yang-der-sap-sicherheit\\\/\",\"name\":\"Expert Talk SAP Security: Ying und Yang der SAP-Sicherheit.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/expert-talk-ying-und-yang-der-sap-sicherheit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/expert-talk-ying-und-yang-der-sap-sicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/ITOK-Security_Keyvisual.png\",\"datePublished\":\"2023-05-10T13:39:53+00:00\",\"dateModified\":\"2024-04-29T12:54:42+00:00\",\"description\":\"Erfahren Sie, welche Vorteile Ihnen die zielgerichtete Kombination aus Threat Detection und Vulnerability Management erm\u00f6glicht.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/expert-talk-ying-und-yang-der-sap-sicherheit\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/expert-talk-ying-und-yang-der-sap-sicherheit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/expert-talk-ying-und-yang-der-sap-sicherheit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/ITOK-Security_Keyvisual.png\",\"contentUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/ITOK-Security_Keyvisual.png\",\"width\":1920,\"height\":1080,\"caption\":\"PLDE_ITOK-Security_Keyvisual\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/expert-talk-ying-und-yang-der-sap-sicherheit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[Expert Talk] Ying und Yang der SAP-Sicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\",\"name\":\"Pathlock\",\"description\":\"The Leader in Application Security and Controls Automation\",\"publisher\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pathlock.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#organization\",\"name\":\"Pathlock, Inc\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"contentUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"width\":460,\"height\":148,\"caption\":\"Pathlock, Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/pathlock\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pathlock\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCgo4izMJ70K4gnyWQ_mP-OA\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Expert Talk SAP Security: Ying und Yang der SAP-Sicherheit.","description":"Erfahren Sie, welche Vorteile Ihnen die zielgerichtete Kombination aus Threat Detection und Vulnerability Management erm\u00f6glicht.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pathlock.com\/de\/resource\/expert-talk-ying-und-yang-der-sap-sicherheit\/","og_locale":"de_DE","og_type":"article","og_title":"Expert Talk SAP Security: Ying und Yang der SAP-Sicherheit.","og_description":"Erfahren Sie, welche Vorteile Ihnen die zielgerichtete Kombination aus Threat Detection und Vulnerability Management erm\u00f6glicht.","og_url":"https:\/\/pathlock.com\/de\/resource\/expert-talk-ying-und-yang-der-sap-sicherheit\/","og_site_name":"Pathlock","article_modified_time":"2024-04-29T12:54:42+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/ITOK-Security_Keyvisual.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Expert Talk SAP Security: Ying und Yang der SAP-Sicherheit.","twitter_description":"Erfahren Sie, welche Vorteile Ihnen die zielgerichtete Kombination aus Threat Detection und Vulnerability Management erm\u00f6glicht.","twitter_site":"@pathlock","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pathlock.com\/de\/resource\/expert-talk-ying-und-yang-der-sap-sicherheit\/","url":"https:\/\/pathlock.com\/de\/resource\/expert-talk-ying-und-yang-der-sap-sicherheit\/","name":"Expert Talk SAP Security: Ying und Yang der SAP-Sicherheit.","isPartOf":{"@id":"https:\/\/pathlock.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pathlock.com\/de\/resource\/expert-talk-ying-und-yang-der-sap-sicherheit\/#primaryimage"},"image":{"@id":"https:\/\/pathlock.com\/de\/resource\/expert-talk-ying-und-yang-der-sap-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/ITOK-Security_Keyvisual.png","datePublished":"2023-05-10T13:39:53+00:00","dateModified":"2024-04-29T12:54:42+00:00","description":"Erfahren Sie, welche Vorteile Ihnen die zielgerichtete Kombination aus Threat Detection und Vulnerability Management erm\u00f6glicht.","breadcrumb":{"@id":"https:\/\/pathlock.com\/de\/resource\/expert-talk-ying-und-yang-der-sap-sicherheit\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pathlock.com\/de\/resource\/expert-talk-ying-und-yang-der-sap-sicherheit\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/pathlock.com\/de\/resource\/expert-talk-ying-und-yang-der-sap-sicherheit\/#primaryimage","url":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/ITOK-Security_Keyvisual.png","contentUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/ITOK-Security_Keyvisual.png","width":1920,"height":1080,"caption":"PLDE_ITOK-Security_Keyvisual"},{"@type":"BreadcrumbList","@id":"https:\/\/pathlock.com\/de\/resource\/expert-talk-ying-und-yang-der-sap-sicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pathlock.com\/de\/"},{"@type":"ListItem","position":2,"name":"[Expert Talk] Ying und Yang der SAP-Sicherheit"}]},{"@type":"WebSite","@id":"https:\/\/pathlock.com\/de\/#website","url":"https:\/\/pathlock.com\/de\/","name":"Pathlock","description":"The Leader in Application Security and Controls Automation","publisher":{"@id":"https:\/\/pathlock.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pathlock.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/pathlock.com\/de\/#organization","name":"Pathlock, Inc","url":"https:\/\/pathlock.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/pathlock.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","contentUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","width":460,"height":148,"caption":"Pathlock, Inc"},"image":{"@id":"https:\/\/pathlock.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/pathlock","https:\/\/www.linkedin.com\/company\/pathlock","https:\/\/www.youtube.com\/channel\/UCgo4izMJ70K4gnyWQ_mP-OA"]}]}},"ACF":{"hero_image":{"ID":33236,"id":33236,"title":"Yin yang symbol in the glowing light bulb. SAP Security Expert Talk.","filename":"PLDE_ITOK_SAP-ETD.jpg","filesize":78979,"url":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/PLDE_ITOK_SAP-ETD.jpg","link":"https:\/\/pathlock.com\/de\/resource\/expert-talk-ying-und-yang-der-sap-sicherheit\/yin-yang-symbol-in-light-bulb-2\/","alt":"Yin yang symbol in the glowing light bulb. SAP Security Expert Talk.","author":"39","description":"Yin yang symbol in the glowing light bulb. SAP Security Expert Talk.","caption":"PLDE_Yin yang symbol in the glowing light bulb. SAP Security Expert Talk.","name":"yin-yang-symbol-in-light-bulb-2","status":"inherit","uploaded_to":33235,"date":"2023-05-09 13:51:33","modified":"2023-05-09 13:52:19","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/pathlock.com\/wp-includes\/images\/media\/default.png","width":763,"height":458,"sizes":{"thumbnail":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/PLDE_ITOK_SAP-ETD-150x150.jpg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/PLDE_ITOK_SAP-ETD-300x180.jpg","medium-width":300,"medium-height":180,"medium_large":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/PLDE_ITOK_SAP-ETD.jpg","medium_large-width":763,"medium_large-height":458,"large":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/PLDE_ITOK_SAP-ETD.jpg","large-width":763,"large-height":458,"1536x1536":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/PLDE_ITOK_SAP-ETD.jpg","1536x1536-width":763,"1536x1536-height":458,"2048x2048":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/PLDE_ITOK_SAP-ETD.jpg","2048x2048-width":763,"2048x2048-height":458,"menu-nav-img":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/PLDE_ITOK_SAP-ETD-112x112.jpg","menu-nav-img-width":112,"menu-nav-img-height":112,"menu-nav-img-company":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/PLDE_ITOK_SAP-ETD-292x138.jpg","menu-nav-img-company-width":292,"menu-nav-img-company-height":138,"big-promoted-resoruces-post":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/PLDE_ITOK_SAP-ETD-724x435.jpg","big-promoted-resoruces-post-width":724,"big-promoted-resoruces-post-height":435,"small-promoted-resoruces-post":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/PLDE_ITOK_SAP-ETD-294x178.jpg","small-promoted-resoruces-post-width":294,"small-promoted-resoruces-post-height":178}},"is_section_explore_industry_thought_leadership":true,"case_study":"resource","video_or_pdf_download":"video","intro_details_page":"In diesem Expert Talk stellen wir Ihnen anhand von Beispielen vor, welche Vorteile die zielgerichtete Kombination aus Threat Detection und Vulnerability Management erm\u00f6glicht.","youtube_embed_src":"https:\/\/www.youtube-nocookie.com\/embed\/oglkjmaimyI","video_cover":{"ID":33240,"id":33240,"title":"PLDE_ITOK-Security_Keyvisual","filename":"ITOK-Security_Keyvisual.png","filesize":860460,"url":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/ITOK-Security_Keyvisual.png","link":"https:\/\/pathlock.com\/de\/resource\/expert-talk-ying-und-yang-der-sap-sicherheit\/itok-security_keyvisual\/","alt":"PLDE_ITOK-Security_Keyvisual","author":"39","description":"PLDE_ITOK-Security_Keyvisual","caption":"PLDE_ITOK-Security_Keyvisual","name":"itok-security_keyvisual","status":"inherit","uploaded_to":33235,"date":"2023-05-10 13:39:23","modified":"2023-05-10 13:39:39","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/pathlock.com\/wp-includes\/images\/media\/default.png","width":1920,"height":1080,"sizes":{"thumbnail":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/ITOK-Security_Keyvisual-150x150.png","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/ITOK-Security_Keyvisual-300x169.png","medium-width":300,"medium-height":169,"medium_large":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/ITOK-Security_Keyvisual-768x432.png","medium_large-width":768,"medium_large-height":432,"large":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/ITOK-Security_Keyvisual-1024x576.png","large-width":1024,"large-height":576,"1536x1536":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/ITOK-Security_Keyvisual-1536x864.png","1536x1536-width":1536,"1536x1536-height":864,"2048x2048":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/ITOK-Security_Keyvisual.png","2048x2048-width":1920,"2048x2048-height":1080,"menu-nav-img":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/ITOK-Security_Keyvisual-112x112.png","menu-nav-img-width":112,"menu-nav-img-height":112,"menu-nav-img-company":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/ITOK-Security_Keyvisual-292x138.png","menu-nav-img-company-width":292,"menu-nav-img-company-height":138,"big-promoted-resoruces-post":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/ITOK-Security_Keyvisual-724x435.png","big-promoted-resoruces-post-width":724,"big-promoted-resoruces-post-height":435,"small-promoted-resoruces-post":"https:\/\/pathlock.com\/wp-content\/uploads\/2023\/05\/ITOK-Security_Keyvisual-294x178.png","small-promoted-resoruces-post-width":294,"small-promoted-resoruces-post-height":178}},"video_duration":"49 min.","form_id":"a770981d-58bb-4be9-9c23-d395cbd8b472"},"_links":{"self":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/resource\/33235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/users\/59"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/media\/33240"}],"wp:attachment":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/media?parent=33235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/categories?post=33235"},{"taxonomy":"content_type","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/content_type?post=33235"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/topic?post=33235"},{"taxonomy":"erp-solutions","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/erp-solutions?post=33235"},{"taxonomy":"magazines","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/magazines?post=33235"},{"taxonomy":"analyst-firm","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/analyst-firm?post=33235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}