{"id":10773,"date":"2025-11-25T17:12:10","date_gmt":"2025-11-25T16:12:10","guid":{"rendered":"https:\/\/library.cancom.de\/master\/?post_type=referenz&p=10773"},"modified":"2025-11-25T17:16:22","modified_gmt":"2025-11-25T16:16:22","slug":"gkk-partners-sichert-sensible-daten-mit-ganzheitlichem-sicherheitskonzept","status":"publish","type":"referenz","link":"https:\/\/library.cancom.de\/master\/referenz\/gkk-partners-sichert-sensible-daten-mit-ganzheitlichem-sicherheitskonzept\/","title":{"rendered":"GKK PARTNERS sichert sensible Daten mit ganzheitlichem Sicherheitskonzept"},"excerpt":{"rendered":"

GKK PARTNERS z\u00e4hlt zu den f\u00fchrenden Kanzleien f\u00fcr Steuerberatung und Wirtschaftspr\u00fcfung in M\u00fcnchen. Mit dem Ziel, sensible Mandantendaten noch besser zu sch\u00fctzen und interne IT-Prozesse effizienter zu gestalten, entschied sich die Kanzlei f\u00fcr eine gezielte Modernisierung ihrer Sicherheitsarchitektur. Mit CrowdStrike Falcon Complete und Rubrik Enterprise
\nEdition fiel die Wahl auf zwei f\u00fchrende Security-L\u00f6sungen, die diese Anforderungen in idealer Weise abdecken. <\/p>\n","protected":false},"author":14,"featured_media":10775,"template":"","meta":{"inline_featured_image":false,"greyd_block_editor_preview":[]},"referenz_category":[63],"referenz_tag":[2935,99,2933,2925,2937,2671,2675,2927,2929,2931,1987,2663,2939,2665,2007],"referenz_branche":[150],"referenz_hersteller":[684,2021],"referenz_thema":[105],"referenz_beitragstyp":[73],"referenz_anzeigebereich":[],"referenz_zielseite":[74,75],"referenz_status":[76],"referenz_medien":[],"navpoint":[],"class_list":["post-10773","referenz","type-referenz","status-publish","has-post-thumbnail","hentry","referenz_category-referenz","referenz_tag-anomalieerkennung","referenz_tag-backup","referenz_tag-bedrohungsanalyse","referenz_tag-cloudnative","referenz_tag-crowdstrike-falcon-complete","referenz_tag-cyberresilienz","referenz_tag-endpoint-security","referenz_tag-exposure-management","referenz_tag-identity-protection","referenz_tag-indexierung","referenz_tag-mdr","referenz_tag-recovery","referenz_tag-rubrik-enterprise-edition","referenz_tag-wiederherstellung","referenz_tag-workshop","referenz_branche-dienstleistungen","referenz_hersteller-crowdstrike","referenz_hersteller-rubrik","referenz_thema-security","referenz_beitragstyp-success-story","referenz_zielseite-newsroom","referenz_zielseite-referenzhub","referenz_status-online"],"lang":"de","translations":{"de":10773},"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/library.cancom.de\/master\/wp-json\/wp\/v2\/referenz\/10773","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/library.cancom.de\/master\/wp-json\/wp\/v2\/referenz"}],"about":[{"href":"https:\/\/library.cancom.de\/master\/wp-json\/wp\/v2\/types\/referenz"}],"author":[{"embeddable":true,"href":"https:\/\/library.cancom.de\/master\/wp-json\/wp\/v2\/users\/14"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/library.cancom.de\/master\/wp-json\/wp\/v2\/media\/10775"}],"wp:attachment":[{"href":"https:\/\/library.cancom.de\/master\/wp-json\/wp\/v2\/media?parent=10773"}],"wp:term":[{"taxonomy":"referenz_category","embeddable":true,"href":"https:\/\/library.cancom.de\/master\/wp-json\/wp\/v2\/referenz_category?post=10773"},{"taxonomy":"referenz_tag","embeddable":true,"href":"https:\/\/library.cancom.de\/master\/wp-json\/wp\/v2\/referenz_tag?post=10773"},{"taxonomy":"referenz_branche","embeddable":true,"href":"https:\/\/library.cancom.de\/master\/wp-json\/wp\/v2\/referenz_branche?post=10773"},{"taxonomy":"referenz_hersteller","embeddable":true,"href":"https:\/\/library.cancom.de\/master\/wp-json\/wp\/v2\/referenz_hersteller?post=10773"},{"taxonomy":"referenz_thema","embeddable":true,"href":"https:\/\/library.cancom.de\/master\/wp-json\/wp\/v2\/referenz_thema?post=10773"},{"taxonomy":"referenz_beitragstyp","embeddable":true,"href":"https:\/\/library.cancom.de\/master\/wp-json\/wp\/v2\/referenz_beitragstyp?post=10773"},{"taxonomy":"referenz_anzeigebereich","embeddable":true,"href":"https:\/\/library.cancom.de\/master\/wp-json\/wp\/v2\/referenz_anzeigebereich?post=10773"},{"taxonomy":"referenz_zielseite","embeddable":true,"href":"https:\/\/library.cancom.de\/master\/wp-json\/wp\/v2\/referenz_zielseite?post=10773"},{"taxonomy":"referenz_status","embeddable":true,"href":"https:\/\/library.cancom.de\/master\/wp-json\/wp\/v2\/referenz_status?post=10773"},{"taxonomy":"referenz_medien","embeddable":true,"href":"https:\/\/library.cancom.de\/master\/wp-json\/wp\/v2\/referenz_medien?post=10773"},{"taxonomy":"navpoint","embeddable":true,"href":"https:\/\/library.cancom.de\/master\/wp-json\/wp\/v2\/navpoint?post=10773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}