{"id":3688,"date":"2021-04-07T11:16:56","date_gmt":"2021-04-07T09:16:56","guid":{"rendered":"https:\/\/www.synko.de\/data-security-where-is-your-erp-crm-data-safe\/"},"modified":"2021-05-03T16:50:07","modified_gmt":"2021-05-03T14:50:07","slug":"data-security-where-is-your-erp-crm-data-safe","status":"publish","type":"post","link":"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/","title":{"rendered":"Data security: Where is your ERP\/CRM data safe?"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-overflow:visible;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top:-25px;--awb-margin-bottom:10px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:24;line-height:1.4;\">Where is your ERP\/CRM data safe?<\/h1><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first\" style=\"--awb-bg-size:cover;width:30.6666%; margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-image-element in-legacy-container\" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"300\" height=\"184\" title=\"Security 1\" src=\"https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-1.png\" data-orig-src=\"https:\/\/www.synko.de\/wp-0e004-content\/uploads\/\/Security-1-300x184.png\" alt class=\"lazyload img-responsive wp-image-3680\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27788%27%20height%3D%27482%27%20viewBox%3D%270%200%20788%20482%27%3E%3Crect%20width%3D%27788%27%20height%3D%27482%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-1-200x122.png 200w, https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-1-400x245.png 400w, https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-1-600x367.png 600w, https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-1.png 788w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1000px) 100vw, 400px\" \/><\/span><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-two-third fusion-column-last\" style=\"--awb-bg-size:cover;width:65.3333%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>The question of security plays an important role in the discussions about the decision between on-premise and cloud solutions. We notice that the solution on the company&#8217;s own premises is quite often considered the more secure option. The reason is simply the physical close proximity to the data and the feeling of control. Of course, the interesting question is whether this assumption is correct and what the reality really looks like. <\/p>\n<p>Where is your ERP\/CRM data most secure &#8211; in your own data centre or in the public cloud?<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1040px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><p>The subject of data security is currently at the focus of many discussions. And understandably so, as there are many third parties who want to access, control or even steal your data. In today&#8217;s highly competitive markets, companies are forced to handle their data with extreme caution for several factors. <\/p>\n<p>So where is your valuable data most secure? Let&#8217;s have a look at this question with an on-premise situation in mind. <strong>The first point <\/strong> to consider is the level of professionalism required. Hackers are becoming more and more sophisticated at a rapid speed, so the way they handle data must also become more and more professional. Ideally, you should always be one step ahead of the hackers. So you need to consider the level of expertise of your IT staff, their experience and mentality, your budgets and the ability to fill vacancies.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1040px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><p>The <strong>second point<\/strong> is the profundity of your knowledge. What is the current level of competence of your IT staff? When was the last time you gained a new perspective through recruitment? What are your budgets like in terms of training and motivation? Is it enough to keep up with the pace? And how has the trend in these budgets developed over the last few years? <\/p>\n<p>The <strong>third point<\/strong> is the scope of your competencies and the level of your experience. To what extent are you able to manage all the applications, databases, operating systems and reporting tools that your company uses today? Are you satisfied with the answer to this question?<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"300\" height=\"187\" title=\"Security 2\" src=\"https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-2.jpg\" data-orig-src=\"https:\/\/www.synko.de\/wp-0e004-content\/uploads\/\/Security-2-300x187.jpg\" alt class=\"lazyload img-responsive wp-image-3682\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27773%27%20height%3D%27483%27%20viewBox%3D%270%200%20773%20483%27%3E%3Crect%20width%3D%27773%27%20height%3D%27483%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-2-200x125.jpg 200w, https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-2-400x250.jpg 400w, https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-2-600x375.jpg 600w, https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-2.jpg 773w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1040px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\"><p>The<strong> fourth point<\/strong> is physical access to your servers. What exactly are the access controls to your server room? How many different people have access? Do you know what staff and external providers are doing in that room? And please don&#8217;t forget the after-hours cleaning staff. <\/p>\n<p>And finally, audits. How often do you have a professional IT audit made by an external company that honestly tells you what the weak points of your security strategy are? And how closely do you follow their recommendations? According to a rough estimate, 40% of all companies using on-premise solutions do not perform a daily backup of their data. Does this news shock you? And are you sure that your company belongs to the other 60%? <\/p>\n<p>Let&#8217;s face the facts:<\/p>\n<ol>\n<li>In today&#8217;s world, data security is critical;<\/li>\n<li>You need to run a business and focus on your customers, employees and goals; and<\/li>\n<li>Data security is not part of your core business.<\/li>\n<\/ol>\n<p>In 2020, Microsoft was selected to bid on the Joint Enterprise Defense Infrastructure contract awarded by the Pentagon, the headquarters of the US Department of Defense. The Pentagon is most likely the organisation that values confidentiality the most of any company in the world. And the one with the most to lose! This contract could potentially address many companies&#8217; mistrust of cloud security. Microsoft employs 3,500 engineers specialising in cyber security and invests a billion dollars a year in cyber security. <\/p>\n<p>There is no doubt that the security of Microsoft data centres is far better than that of the server room and IT staff of the average SME. Does this also apply to your company?<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-5\"><p><a href=\"https:\/\/www.synko.de\/en\/contact\/\"><img decoding=\"async\" class=\"lazyload size-full wp-image-1662 alignleft\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2740%27%20height%3D%2741%27%20viewBox%3D%270%200%2040%2041%27%3E%3Crect%20width%3D%2740%27%20height%3D%2741%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.synko.de\/wp-0e004-content\/uploads\/information-rot-120-e1571295425666.png\" alt=\"\" width=\"40\" height=\"41\" \/><\/a><a href=\"https:\/\/www.synko.de\/en\/contact\/\">Weitere Informationen zu den synko-Serviceleistungen anfordern.<\/a><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The question of security plays an important role in the discussions about the decision between on-premise and cloud solutions. <\/p>\n","protected":false},"author":3,"featured_media":3682,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30,66],"tags":[75,74,87,64,33],"class_list":["post-3688","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en","category-titelseite-en","tag-cloud-solutions","tag-crm-en","tag-data-security","tag-erp-en","tag-microsoft-dynamics-365-business-central-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v26.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data security: Where is your ERP\/CRM data safe? - synko GmbH<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data security: Where is your ERP\/CRM data safe?\" \/>\n<meta property=\"og:description\" content=\"The question of security plays an important role in the discussions about the decision between on-premise and cloud solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/\" \/>\n<meta property=\"og:site_name\" content=\"synko GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/synkoitloesungen\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-07T09:16:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-03T14:50:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"773\" \/>\n\t<meta property=\"og:image:height\" content=\"483\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Marion H\u00f6ch\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marion H\u00f6ch\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"19 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/\",\"url\":\"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/\",\"name\":\"Data security: Where is your ERP\/CRM data safe? - synko GmbH\",\"isPartOf\":{\"@id\":\"https:\/\/www.synko.de\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-2.jpg\",\"datePublished\":\"2021-04-07T09:16:56+00:00\",\"dateModified\":\"2021-05-03T14:50:07+00:00\",\"author\":{\"@id\":\"https:\/\/www.synko.de\/en\/#\/schema\/person\/571ab0c2b1fe6b90358890051dfc2857\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/#primaryimage\",\"url\":\"https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-2.jpg\",\"contentUrl\":\"https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-2.jpg\",\"width\":773,\"height\":483,\"caption\":\"Datensicherheit f\u00fcr ERP-\/CRM-Daten von synko GmbH Ihr Partner f\u00fcr Microsoft Dynamics\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.synko.de\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data security: Where is your ERP\/CRM data safe?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.synko.de\/en\/#website\",\"url\":\"https:\/\/www.synko.de\/en\/\",\"name\":\"synko GmbH\",\"description\":\"People. Processes. Solutions.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.synko.de\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.synko.de\/en\/#\/schema\/person\/571ab0c2b1fe6b90358890051dfc2857\",\"name\":\"Marion H\u00f6ch\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.synko.de\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c82f4bbad996ecf3d8dd5bcdc954b6b66afec09374c9d179ab6b367af006d025?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c82f4bbad996ecf3d8dd5bcdc954b6b66afec09374c9d179ab6b367af006d025?s=96&d=mm&r=g\",\"caption\":\"Marion H\u00f6ch\"},\"url\":\"https:\/\/www.synko.de\/en\/author\/mhoech\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data security: Where is your ERP\/CRM data safe? - synko GmbH","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/","og_locale":"en_US","og_type":"article","og_title":"Data security: Where is your ERP\/CRM data safe?","og_description":"The question of security plays an important role in the discussions about the decision between on-premise and cloud solutions.","og_url":"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/","og_site_name":"synko GmbH","article_publisher":"https:\/\/www.facebook.com\/synkoitloesungen\/","article_published_time":"2021-04-07T09:16:56+00:00","article_modified_time":"2021-05-03T14:50:07+00:00","og_image":[{"width":773,"height":483,"url":"https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-2.jpg","type":"image\/jpeg"}],"author":"Marion H\u00f6ch","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Marion H\u00f6ch","Est. reading time":"19 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/","url":"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/","name":"Data security: Where is your ERP\/CRM data safe? - synko GmbH","isPartOf":{"@id":"https:\/\/www.synko.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/#primaryimage"},"image":{"@id":"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/#primaryimage"},"thumbnailUrl":"https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-2.jpg","datePublished":"2021-04-07T09:16:56+00:00","dateModified":"2021-05-03T14:50:07+00:00","author":{"@id":"https:\/\/www.synko.de\/en\/#\/schema\/person\/571ab0c2b1fe6b90358890051dfc2857"},"breadcrumb":{"@id":"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/#primaryimage","url":"https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-2.jpg","contentUrl":"https:\/\/www.synko.de\/wp-0e004-content\/uploads\/Security-2.jpg","width":773,"height":483,"caption":"Datensicherheit f\u00fcr ERP-\/CRM-Daten von synko GmbH Ihr Partner f\u00fcr Microsoft Dynamics"},{"@type":"BreadcrumbList","@id":"https:\/\/www.synko.de\/en\/data-security-where-is-your-erp-crm-data-safe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.synko.de\/en\/"},{"@type":"ListItem","position":2,"name":"Data security: Where is your ERP\/CRM data safe?"}]},{"@type":"WebSite","@id":"https:\/\/www.synko.de\/en\/#website","url":"https:\/\/www.synko.de\/en\/","name":"synko GmbH","description":"People. Processes. Solutions.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.synko.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.synko.de\/en\/#\/schema\/person\/571ab0c2b1fe6b90358890051dfc2857","name":"Marion H\u00f6ch","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.synko.de\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c82f4bbad996ecf3d8dd5bcdc954b6b66afec09374c9d179ab6b367af006d025?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c82f4bbad996ecf3d8dd5bcdc954b6b66afec09374c9d179ab6b367af006d025?s=96&d=mm&r=g","caption":"Marion H\u00f6ch"},"url":"https:\/\/www.synko.de\/en\/author\/mhoech\/"}]}},"_links":{"self":[{"href":"https:\/\/www.synko.de\/en\/wp-json\/wp\/v2\/posts\/3688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.synko.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.synko.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.synko.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.synko.de\/en\/wp-json\/wp\/v2\/comments?post=3688"}],"version-history":[{"count":9,"href":"https:\/\/www.synko.de\/en\/wp-json\/wp\/v2\/posts\/3688\/revisions"}],"predecessor-version":[{"id":3697,"href":"https:\/\/www.synko.de\/en\/wp-json\/wp\/v2\/posts\/3688\/revisions\/3697"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.synko.de\/en\/wp-json\/wp\/v2\/media\/3682"}],"wp:attachment":[{"href":"https:\/\/www.synko.de\/en\/wp-json\/wp\/v2\/media?parent=3688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.synko.de\/en\/wp-json\/wp\/v2\/categories?post=3688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.synko.de\/en\/wp-json\/wp\/v2\/tags?post=3688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}