{"id":10339,"date":"2020-07-03T06:00:59","date_gmt":"2020-07-03T04:00:59","guid":{"rendered":"https:\/\/news.save.ch\/?p=10339"},"modified":"2023-03-14T08:56:36","modified_gmt":"2023-03-14T07:56:36","slug":"data-protection-wie-erp-systeme-dabei-unterstuetzen","status":null,"type":"post","link":"https:\/\/news.save.ch\/fr\/data-protection-wie-erp-systeme-dabei-unterstuetzen\/","title":{"rendered":"Protection des donn\u00e9es - comment les syst\u00e8mes ERP y contribuent"},"content":{"rendered":"<figure id=\"attachment_10340\" aria-describedby=\"caption-attachment-10340\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-10340 size-medium\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/07\/Depositphotos_13165644_s-2019.jpg\" alt=\"Syst\u00e8me ERP\" width=\"680\" height=\"454\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/07\/Depositphotos_13165644_s-2019.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2020\/07\/Depositphotos_13165644_s-2019-375x250.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-10340\" class=\"wp-caption-text\">\u00a9 depositphotos, buchachon_photo<\/figcaption><\/figure>\n<p>La Suisse est une cible attrayante pour les pirates informatiques. Cela ne vaut pas seulement pour les grands groupes, mais aussi et surtout pour les petites et moyennes entreprises (PME). L'\u00e9t\u00e9 dernier par exemple, le nombre d'attaques infiltrant des r\u00e9seaux entiers d'entreprises et cryptant des donn\u00e9es a augment\u00e9. Souvent, les entreprises ne sont pas pr\u00e9par\u00e9es \u00e0 de telles attaques - entre autres parce qu'elles investissent peu dans la s\u00e9curit\u00e9 informatique. Pourtant, les donn\u00e9es personnelles sont le bien le plus important dans le cadre du changement num\u00e9rique.<\/p>\n<p>Les entreprises qui se prot\u00e8gent misent souvent sur les mesures courantes telles que l'utilisation de logiciels de protection (pare-feu et programmes antivirus), l'ex\u00e9cution de mises \u00e0 jour de s\u00e9curit\u00e9 et la formation des collaborateurs. Les logiciels professionnels disponibles dans le cloud constituent un compl\u00e9ment judicieux.<\/p>\n<p><strong>Le cloud comme facteur de s\u00e9curit\u00e9<\/strong><\/p>\n<p>Qu'il s'agisse de l'Internet des objets, de l'automatisation ou de l'image globale du client, les donn\u00e9es jouent un r\u00f4le d\u00e9cisif dans presque toutes les tendances de la num\u00e9risation. Elles doivent \u00eatre disponibles de mani\u00e8re centralis\u00e9e - de pr\u00e9f\u00e9rence dans un <a href=\"https:\/\/de.wikipedia.org\/wiki\/Enterprise-Resource-Planning\">ERP<\/a>-syst\u00e8me d'information. En raison de la valeur \u00e9lev\u00e9e des informations, les PME devraient se pencher sur la question de savoir comment les prot\u00e9ger au mieux des tiers.<\/p>\n<p>Une possibilit\u00e9 est de changer de lieu de stockage pour le cloud. Mais celui-ci doit encore faire face \u00e0 des pr\u00e9jug\u00e9s, surtout dans les petites entreprises. Et ce, bien que la plupart des fabricants d'ERP en nuage travaillent avec des partenaires informatiques hautement qualifi\u00e9s, qui garantissent des centres de calcul hautement s\u00e9curis\u00e9s dans leur propre pays et assurent une surveillance et une maintenance continues du syst\u00e8me. Mais outre l'optimisation de la s\u00e9curit\u00e9 des donn\u00e9es par les centres de calcul, les fabricants de logiciels ont \u00e9galement contribu\u00e9 \u00e0 la protection des donn\u00e9es gr\u00e2ce \u00e0 de nouveaux modules.<\/p>\n<p><strong>Une meilleure s\u00e9curit\u00e9 des donn\u00e9es<\/strong><\/p>\n<p>Aucun logiciel d'entreprise ne peut faire de compromis en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es, surtout dans le cloud. C'est pourquoi, lors du choix de Cloud ERP par exemple, il faut veiller \u00e0 ce que les fabricants soient exploit\u00e9s dans des centres de calcul g\u00e9o-redondants et \u00e0 haute disponibilit\u00e9. Car ceux-ci offrent d\u00e9j\u00e0 aujourd'hui<\/p>\n<ul>\n<li>les normes les plus \u00e9lev\u00e9es en mati\u00e8re de pr\u00e9vention des dommages et de contr\u00f4le d'acc\u00e8s<\/li>\n<li>Efficacit\u00e9 \u00e9nerg\u00e9tique et respect du climat<\/li>\n<li>la surveillance et la maintenance continues de l'ensemble du syst\u00e8me<\/li>\n<li>des contr\u00f4les d'acc\u00e8s stricts, des groupes \u00e9lectrog\u00e8nes de secours et des syst\u00e8mes d'extinction d'incendie<\/li>\n<li>des sauvegardes permanentes et des mises \u00e0 jour de s\u00e9curit\u00e9 automatis\u00e9es<\/li>\n<li>de nombreux certificats de qualit\u00e9<\/li>\n<li>une grande disponibilit\u00e9<\/li>\n<\/ul>\n<p>A cela s'ajoute un autre aspect qui joue un grand r\u00f4le, surtout \u00e0 l'\u00e9poque de Corona : La protection contre les cyber-attaques lors du travail mobile. Le cryptage des donn\u00e9es, comme Transport Layer Security (<a href=\"https:\/\/de.wikipedia.org\/wiki\/Transport_Layer_Security\">TLS<\/a>) peuvent y rem\u00e9dier.<\/p>\n<p><strong>Plus de protection des donn\u00e9es<\/strong><\/p>\n<p>En mati\u00e8re de protection des donn\u00e9es, le r\u00e8glement g\u00e9n\u00e9ral europ\u00e9en sur la protection des donn\u00e9es (RGPD) joue un r\u00f4le important, du moins pour les entreprises qui exportent vers d'autres pays europ\u00e9ens. Le logiciel de gestion utilis\u00e9 doit aider \u00e0 ma\u00eetriser les multiples r\u00e8gles. Par exemple avec un concept de suppression ou l'anonymisation des donn\u00e9es. Dans ce cas, les donn\u00e9es des clients sont \u00e9cras\u00e9es et supprim\u00e9es de mani\u00e8re irr\u00e9versible. Ces deux \u00e9l\u00e9ments aident les PME \u00e0 r\u00e9viser en quelques \u00e9tapes leur base de donn\u00e9es conform\u00e9ment \u00e0 la loi et \u00e0 r\u00e9duire ainsi le risque de sanctions. Un assistant d'anonymisation fait donc partie des mesures les plus importantes en mati\u00e8re de protection des donn\u00e9es.<\/p>\n<p>En outre, le logiciel de gestion devrait \u00e9galement aider \u00e0 respecter le d\u00e9lai de conservation. Les programmes intelligents sont en mesure de v\u00e9rifier, tant pour les documents d'achat et de vente que pour les contrats, si un enregistrement qui y est li\u00e9 a encore une dur\u00e9e de conservation valable ou non. En outre, il est souvent possible de d\u00e9finir manuellement si une suppression est en principe interdite ou si elle doit seulement faire l'objet d'un avertissement. L'utilisateur peut ainsi d\u00e9cider lui-m\u00eame de la dur\u00e9e de conservation qui lui convient.<\/p>\n<p><strong>Conclusion : plus de s\u00e9curit\u00e9 avec un logiciel de gestion innovant<\/strong><\/p>\n<p>Dans le pass\u00e9, la protection des donn\u00e9es et le cloud computing \u00e9taient pour certaines entreprises deux paires de chaussures diff\u00e9rentes. Mais gr\u00e2ce \u00e0 la disparition des pr\u00e9jug\u00e9s, \u00e0 l'optimisation des centres de calcul suisses et au d\u00e9veloppement des logiciels professionnels, de plus en plus de d\u00e9cideurs sont ouverts \u00e0 la voie du cloud. Ce n'est pas \u00e9tonnant, car du c\u00f4t\u00e9 des exploitants de centres de calcul, tout est fait pour prot\u00e9ger les donn\u00e9es, qui sont le bien le plus pr\u00e9cieux.<\/p>\n<p>Parall\u00e8lement, il existe de plus en plus de programmes ERP dans le cloud qui mettent \u00e0 disposition beaucoup plus rapidement de nouvelles fonctionnalit\u00e9s telles que l'anonymisation et facilitent ainsi le quotidien des entreprises, voire l'automatisent. Cela r\u00e9duit le scepticisme et les doutes des PME et ouvre la voie \u00e0 une protection des donn\u00e9es optimis\u00e9e.<\/p>\n<p><em>Auteur : David Lauchenauer, directeur g\u00e9n\u00e9ral du groupe Myfactory, fabricant d'ERP dans le cloud <a href=\"https:\/\/www.myfactoryschweiz.ch\/\">Myfactory<\/a><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Die Schweiz ist ein attraktives Ziel f\u00fcr Hacker. Das gilt nicht nur f\u00fcr Konzerne, sondern vor allem auch f\u00fcr kleinere und mittlere Unternehmen (KMU). Im letzten Sommer zum Beispiel stieg die Anzahl von Angriffen, die ganze Unternehmensnetzwerke infiltrieren und Daten verschl\u00fcsseln. Oft sind Betriebe nicht auf solche Attacken vorbereitet \u2013 unter anderem auch, weil wenig [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":10340,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[925,926,927,118,378,928],"class_list":["post-10339","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-cloud-erp","tag-cyberangriff","tag-data-protection","tag-datenschutz","tag-dsgvo","tag-erp-systeme"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"ERP","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data Protection \u2013 wie ERP-Systeme dabei unterst\u00fctzen - Save<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/fr\/data-protection-wie-erp-systeme-dabei-unterstuetzen\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Protection \u2013 wie ERP-Systeme dabei unterst\u00fctzen - Save\" \/>\n<meta property=\"og:description\" content=\"Die Schweiz ist ein attraktives Ziel f\u00fcr Hacker. Das gilt nicht nur f\u00fcr Konzerne, sondern vor allem auch f\u00fcr kleinere und mittlere Unternehmen (KMU). Im letzten Sommer zum Beispiel stieg die Anzahl von Angriffen, die ganze Unternehmensnetzwerke infiltrieren und Daten verschl\u00fcsseln. Oft sind Betriebe nicht auf solche Attacken vorbereitet \u2013 unter anderem auch, weil wenig [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/fr\/data-protection-wie-erp-systeme-dabei-unterstuetzen\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-03T04:00:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:56:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/07\/Depositphotos_13165644_s-2019.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/data-protection-wie-erp-systeme-dabei-unterstuetzen\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/data-protection-wie-erp-systeme-dabei-unterstuetzen\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Data Protection \u2013 wie ERP-Systeme dabei unterst\u00fctzen\",\"datePublished\":\"2020-07-03T04:00:59+00:00\",\"dateModified\":\"2023-03-14T07:56:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/data-protection-wie-erp-systeme-dabei-unterstuetzen\\\/\"},\"wordCount\":682,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/data-protection-wie-erp-systeme-dabei-unterstuetzen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Depositphotos_13165644_s-2019.jpg\",\"keywords\":[\"Cloud ERP\",\"Cyberangriff\",\"Data Protection\",\"Datenschutz\",\"DSGVO\",\"ERP-Systeme\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/data-protection-wie-erp-systeme-dabei-unterstuetzen\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/data-protection-wie-erp-systeme-dabei-unterstuetzen\\\/\",\"name\":\"Data Protection \u2013 wie ERP-Systeme dabei unterst\u00fctzen - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/data-protection-wie-erp-systeme-dabei-unterstuetzen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/data-protection-wie-erp-systeme-dabei-unterstuetzen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Depositphotos_13165644_s-2019.jpg\",\"datePublished\":\"2020-07-03T04:00:59+00:00\",\"dateModified\":\"2023-03-14T07:56:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/data-protection-wie-erp-systeme-dabei-unterstuetzen\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/data-protection-wie-erp-systeme-dabei-unterstuetzen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/data-protection-wie-erp-systeme-dabei-unterstuetzen\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Depositphotos_13165644_s-2019.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Depositphotos_13165644_s-2019.jpg\",\"width\":1000,\"height\":667,\"caption\":\"\u00a9 depositphotos, buchachon_photo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/data-protection-wie-erp-systeme-dabei-unterstuetzen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Protection \u2013 wie ERP-Systeme dabei unterst\u00fctzen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/fr\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protection des donn\u00e9es - comment les syst\u00e8mes ERP y contribuent - Save","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/fr\/data-protection-wie-erp-systeme-dabei-unterstuetzen\/","og_locale":"fr_FR","og_type":"article","og_title":"Data Protection \u2013 wie ERP-Systeme dabei unterst\u00fctzen - Save","og_description":"Die Schweiz ist ein attraktives Ziel f\u00fcr Hacker. Das gilt nicht nur f\u00fcr Konzerne, sondern vor allem auch f\u00fcr kleinere und mittlere Unternehmen (KMU). Im letzten Sommer zum Beispiel stieg die Anzahl von Angriffen, die ganze Unternehmensnetzwerke infiltrieren und Daten verschl\u00fcsseln. Oft sind Betriebe nicht auf solche Attacken vorbereitet \u2013 unter anderem auch, weil wenig [&hellip;]","og_url":"https:\/\/news.save.ch\/fr\/data-protection-wie-erp-systeme-dabei-unterstuetzen\/","og_site_name":"Save","article_published_time":"2020-07-03T04:00:59+00:00","article_modified_time":"2023-03-14T07:56:36+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/07\/Depositphotos_13165644_s-2019.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Roger Str\u00e4ssle","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/data-protection-wie-erp-systeme-dabei-unterstuetzen\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/data-protection-wie-erp-systeme-dabei-unterstuetzen\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Data Protection \u2013 wie ERP-Systeme dabei unterst\u00fctzen","datePublished":"2020-07-03T04:00:59+00:00","dateModified":"2023-03-14T07:56:36+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/data-protection-wie-erp-systeme-dabei-unterstuetzen\/"},"wordCount":682,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/data-protection-wie-erp-systeme-dabei-unterstuetzen\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/07\/Depositphotos_13165644_s-2019.jpg","keywords":["Cloud ERP","Cyberangriff","Data Protection","Datenschutz","DSGVO","ERP-Systeme"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/data-protection-wie-erp-systeme-dabei-unterstuetzen\/","url":"https:\/\/news.save.ch\/data-protection-wie-erp-systeme-dabei-unterstuetzen\/","name":"Protection des donn\u00e9es - comment les syst\u00e8mes ERP y contribuent - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/data-protection-wie-erp-systeme-dabei-unterstuetzen\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/data-protection-wie-erp-systeme-dabei-unterstuetzen\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/07\/Depositphotos_13165644_s-2019.jpg","datePublished":"2020-07-03T04:00:59+00:00","dateModified":"2023-03-14T07:56:36+00:00","breadcrumb":{"@id":"https:\/\/news.save.ch\/data-protection-wie-erp-systeme-dabei-unterstuetzen\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/data-protection-wie-erp-systeme-dabei-unterstuetzen\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/data-protection-wie-erp-systeme-dabei-unterstuetzen\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/07\/Depositphotos_13165644_s-2019.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/07\/Depositphotos_13165644_s-2019.jpg","width":1000,"height":667,"caption":"\u00a9 depositphotos, buchachon_photo"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/data-protection-wie-erp-systeme-dabei-unterstuetzen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Data Protection \u2013 wie ERP-Systeme dabei unterst\u00fctzen"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Revue suisse sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sur la s\u00e9curit\u00e9","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/fr\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/10339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/comments?post=10339"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/10339\/revisions"}],"predecessor-version":[{"id":17321,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/10339\/revisions\/17321"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media\/10340"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media?parent=10339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/categories?post=10339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/tags?post=10339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}