{"id":1686,"date":"2021-06-21T15:13:50","date_gmt":"2021-06-21T13:13:50","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1686"},"modified":"2021-06-22T08:50:50","modified_gmt":"2021-06-22T06:50:50","slug":"data-loss-prevention-protect-your-sensitive-data","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/21\/data-loss-prevention-protect-your-sensitive-data\/","title":{"rendered":"Data Loss Prevention \u2013 protect your sensitive data!"},"content":{"rendered":"<p style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1688 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Motiv_SSR_DLP-Blog-300x225.png\" alt=\"SAST Blog: Data Loss Prevention \u2013 Protect Your Sensitive Data!\" width=\"300\" height=\"225\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Motiv_SSR_DLP-Blog-300x225.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Motiv_SSR_DLP-Blog-768x576.png 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Motiv_SSR_DLP-Blog-800x600.png 800w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Motiv_SSR_DLP-Blog.png 999w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Sensitive enterprise data demands special protection. In addition to company-specific protection requirements, industry-specific specifications and legal regulations must also be observed. Minimizing the risk of losing critical data from SAP systems requires a variety of coordinated measures, collectively known as \u201cdata loss prevention\u201d.<\/p>\n<p><!--more--><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h2><strong>Downloads pose a particular risk and should be monitored<\/strong><\/h2>\n<p>In a standard SAP ERP or SAP S\/4HANA system, particularly in production environments, users usually don\u2019t need direct table access. Key users are an exception to this, because they need to change current settings, such as the FI posting periods. SAP already provides appropriate transactions for such tasks in the standard system, enabling you to avoid granting generic access. In practice, however, we have noticed that these users receive extensive authorizations, particularly to start downloads. Downloads present a potentially critical risk in general and should therefore be logged in the SAP system. The criticality of downloads is enterprise-specific and can be determined based on their source, size, frequency, and other criteria.<\/p>\n<p>We offer a smart, reliable solution for identifying critical downloads:<\/p>\n<h2><strong>Data Loss Prevention with our SAST SUITE<\/strong><\/h2>\n<p>The <a href=\"https:\/\/sast-solutions.com\/sap-security-intelligence.html\" target=\"_blank\" rel=\"noopener\">SAST SUITE<\/a> enables you to identify potential incidents quickly and protect yourself against data loss. As soon as a user starts a download from a critical transaction, the process is logged and the software generates an event.<\/p>\n<p>The following example illustrates a download of the user table USR02 with the password hash values from transaction SE16.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1689\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Blog_DLP-Grafik1_en-1024x340.png\" alt=\"SAST Blog: Data Loss Prevention \u2013 Protect Your Sensitive Data!\" width=\"764\" height=\"254\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Blog_DLP-Grafik1_en-1024x340.png 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Blog_DLP-Grafik1_en-300x100.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Blog_DLP-Grafik1_en-768x255.png 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Blog_DLP-Grafik1_en-1092x364.png 1092w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Blog_DLP-Grafik1_en.png 1096w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><\/p>\n<p>When the download is started from transaction SE16 using the function \u201cSave as Local File\u201d, the user sees the following logging message:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1691\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Blog_DLP-Grafik2_en.png\" alt=\"SAST Blog: Data Loss Prevention \u2013 Protect Your Sensitive Data!\" width=\"529\" height=\"331\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Blog_DLP-Grafik2_en.png 529w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Blog_DLP-Grafik2_en-300x188.png 300w\" sizes=\"auto, (max-width: 529px) 100vw, 529px\" \/><\/p>\n<p>When \u201cDownload\u201d is clicked, the table contents are saved on a local drive and the download is logged as described in the message. The SAST SUITE analyzes the log and triggers the appropriate events.<\/p>\n<p>In addition to the table name, the event view also displays information about the transaction and the terminal used, along with a time stamp and the size of the saved file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1692\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Blog_DLP-Grafik3_en.png\" alt=\"SAST Blog: Data Loss Prevention \u2013 Protect Your Sensitive Data!\" width=\"725\" height=\"805\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Blog_DLP-Grafik3_en.png 725w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Blog_DLP-Grafik3_en-270x300.png 270w\" sizes=\"auto, (max-width: 725px) 100vw, 725px\" \/><br \/>\nBased on this information, IT administrators can now identify download attempts and \u2013 particularly when critical data is downloaded \u2013 approach the user and ask whether these downloads are really necessary, as well as track the status of the data.<strong>\u00a0<\/strong><\/p>\n<h2><strong>Get the security status of your entire SAP system landscape at the touch of a button!<\/strong><\/h2>\n<p>The SAST SUITE lets you define specific critical transactions yourself in just a few simple steps and get alerts in the case of complex events \u2013 even as combinations of multiple incidents that aren\u2019t critical on their own. You will be able to identify future risks in real time and display a graded, dashboard-based display of your security status at the touch of a button.<\/p>\n<p>We will be happy to support you in designing data loss prevention measures at your company. For more information, visit our <a href=\"https:\/\/sast-solutions.com\/\" target=\"_blank\" rel=\"noopener\">website<\/a> or <a href=\"mailto:sast@akquinet.de\" target=\"_blank\" rel=\"noopener\">send us an e-mail<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1268\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Viktor.jpg\" alt=\"Viktor Vogt (SAST SOLUTIONS)\" width=\"257\" height=\"257\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Viktor.jpg 257w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Viktor-150x150.jpg 150w\" sizes=\"auto, (max-width: 257px) 100vw, 257px\" \/><br \/>\n<strong>Viktor Vogt (SAP Security Consultant, SAST SOLUTIONS)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>More about security intelligence:<\/h2>\n<blockquote class=\"wp-embedded-content\" data-secret=\"x84zgxAvHY\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/\">SAP security: Rest easy with a threat intelligence solution<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;SAP security: Rest easy with a threat intelligence solution&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/embed\/#?secret=x84zgxAvHY\" data-secret=\"x84zgxAvHY\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"I8Av98U89y\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/\">Security dashboards \u2013 Just a buzzword or a true help with the daily security routine?<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Security dashboards \u2013 Just a buzzword or a true help with the daily security routine?&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/embed\/#?secret=I8Av98U89y\" data-secret=\"I8Av98U89y\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sensitive enterprise data demands special protection. In addition to company-specific protection requirements, industry-specific specifications and legal regulations must also be observed. Minimizing the risk of losing critical data from SAP systems requires a variety of coordinated measures, collectively known as \u201cdata loss prevention\u201d.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[25,156,58,80,114],"class_list":["post-1686","post","type-post","status-publish","format-standard","hentry","category-sap-threat-detection","tag-cyber-attack","tag-cyber-security","tag-real-time-monitoring","tag-sap-security","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data Loss Prevention | Protective measures for your sensitive data<\/title>\n<meta name=\"description\" content=\"SAP Security &amp; Data Loss Prevention: We show you how you can notice incidents in time and protect against the unwanted leakage of data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/21\/data-loss-prevention-protect-your-sensitive-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Loss Prevention | Protective measures for your sensitive data\" \/>\n<meta property=\"og:description\" content=\"SAP Security &amp; Data Loss Prevention: We show you how you can notice incidents in time and protect against the unwanted leakage of data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/21\/data-loss-prevention-protect-your-sensitive-data\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-21T13:13:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-22T06:50:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Motiv_SSR_DLP-Blog.png\" \/>\n\t<meta property=\"og:image:width\" content=\"999\" \/>\n\t<meta property=\"og:image:height\" content=\"749\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Data Loss Prevention | Protective measures for your sensitive data\" \/>\n<meta name=\"twitter:description\" content=\"SAP Security &amp; Data Loss Prevention: We show you how you can notice incidents in time and protect against the unwanted leakage of data.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Motiv_SSR_DLP-Blog.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/21\\\/data-loss-prevention-protect-your-sensitive-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/21\\\/data-loss-prevention-protect-your-sensitive-data\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Data Loss Prevention \u2013 protect your sensitive data!\",\"datePublished\":\"2021-06-21T13:13:50+00:00\",\"dateModified\":\"2021-06-22T06:50:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/21\\\/data-loss-prevention-protect-your-sensitive-data\\\/\"},\"wordCount\":502,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/21\\\/data-loss-prevention-protect-your-sensitive-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Motiv_SSR_DLP-Blog-300x225.png\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"Real-time monitoring\",\"SAP Security\",\"Threat Detection\"],\"articleSection\":[\"SAP Threat Detection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/21\\\/data-loss-prevention-protect-your-sensitive-data\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/21\\\/data-loss-prevention-protect-your-sensitive-data\\\/\",\"name\":\"Data Loss Prevention | Protective measures for your sensitive data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/21\\\/data-loss-prevention-protect-your-sensitive-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/21\\\/data-loss-prevention-protect-your-sensitive-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Motiv_SSR_DLP-Blog-300x225.png\",\"datePublished\":\"2021-06-21T13:13:50+00:00\",\"dateModified\":\"2021-06-22T06:50:50+00:00\",\"description\":\"SAP Security & Data Loss Prevention: We show you how you can notice incidents in time and protect against the unwanted leakage of data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/21\\\/data-loss-prevention-protect-your-sensitive-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/21\\\/data-loss-prevention-protect-your-sensitive-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/21\\\/data-loss-prevention-protect-your-sensitive-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Motiv_SSR_DLP-Blog.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Motiv_SSR_DLP-Blog.png\",\"width\":999,\"height\":749,\"caption\":\"SAST Blog: Data Loss Prevention \u2013 Protect Your Sensitive Data!\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/21\\\/data-loss-prevention-protect-your-sensitive-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Loss Prevention \u2013 protect your sensitive data!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Loss Prevention | Protective measures for your sensitive data","description":"SAP Security & Data Loss Prevention: We show you how you can notice incidents in time and protect against the unwanted leakage of data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/21\/data-loss-prevention-protect-your-sensitive-data\/","og_locale":"en_US","og_type":"article","og_title":"Data Loss Prevention | Protective measures for your sensitive data","og_description":"SAP Security & Data Loss Prevention: We show you how you can notice incidents in time and protect against the unwanted leakage of data.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/21\/data-loss-prevention-protect-your-sensitive-data\/","og_site_name":"SAST BLOG","article_published_time":"2021-06-21T13:13:50+00:00","article_modified_time":"2021-06-22T06:50:50+00:00","og_image":[{"width":999,"height":749,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Motiv_SSR_DLP-Blog.png","type":"image\/png"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Data Loss Prevention | Protective measures for your sensitive data","twitter_description":"SAP Security & Data Loss Prevention: We show you how you can notice incidents in time and protect against the unwanted leakage of data.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Motiv_SSR_DLP-Blog.png","twitter_misc":{"Written by":"securityblog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/21\/data-loss-prevention-protect-your-sensitive-data\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/21\/data-loss-prevention-protect-your-sensitive-data\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Data Loss Prevention \u2013 protect your sensitive data!","datePublished":"2021-06-21T13:13:50+00:00","dateModified":"2021-06-22T06:50:50+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/21\/data-loss-prevention-protect-your-sensitive-data\/"},"wordCount":502,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/21\/data-loss-prevention-protect-your-sensitive-data\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Motiv_SSR_DLP-Blog-300x225.png","keywords":["Cyber Attack","Cyber Security","Real-time monitoring","SAP Security","Threat Detection"],"articleSection":["SAP Threat Detection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/21\/data-loss-prevention-protect-your-sensitive-data\/","url":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/21\/data-loss-prevention-protect-your-sensitive-data\/","name":"Data Loss Prevention | Protective measures for your sensitive data","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/21\/data-loss-prevention-protect-your-sensitive-data\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/21\/data-loss-prevention-protect-your-sensitive-data\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Motiv_SSR_DLP-Blog-300x225.png","datePublished":"2021-06-21T13:13:50+00:00","dateModified":"2021-06-22T06:50:50+00:00","description":"SAP Security & Data Loss Prevention: We show you how you can notice incidents in time and protect against the unwanted leakage of data.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/21\/data-loss-prevention-protect-your-sensitive-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2021\/06\/21\/data-loss-prevention-protect-your-sensitive-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/21\/data-loss-prevention-protect-your-sensitive-data\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Motiv_SSR_DLP-Blog.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Motiv_SSR_DLP-Blog.png","width":999,"height":749,"caption":"SAST Blog: Data Loss Prevention \u2013 Protect Your Sensitive Data!"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/21\/data-loss-prevention-protect-your-sensitive-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Data Loss Prevention \u2013 protect your sensitive data!"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1686"}],"version-history":[{"count":8,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1686\/revisions"}],"predecessor-version":[{"id":1698,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1686\/revisions\/1698"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}