{"id":11841,"date":"2025-10-07T13:00:00","date_gmt":"2025-10-07T13:00:00","guid":{"rendered":"https:\/\/eperi.com\/?p=11841"},"modified":"2025-10-01T10:22:31","modified_gmt":"2025-10-01T10:22:31","slug":"data-at-rest","status":"publish","type":"post","link":"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/","title":{"rendered":"Data-at-Rest, in-Transit &amp; in-Use: Verschl\u00fcsselung ganzheitlich verstehen und anwenden"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11841\" class=\"elementor elementor-11841\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-936024a e-flex e-con-boxed e-con e-parent\" data-id=\"936024a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf883d6 elementor-widget elementor-widget-tertiaryStage\" data-id=\"bf883d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"tertiaryStage.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"tertiaryStage top_padding_56 \">\n\t\t\t<div>\n\t\t\t\t\t\t\t\t<h1 class=\"title_size_1 top_margin_12 teaserHeadline\">Data-at-Rest, in-Transit & in-Use: Verschl\u00fcsselung ganzheitlich verstehen und anwenden<\/h1>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"top_margin_40 teaser-wrapper\">\n\t\t\t\t<div class=\"style-element\">\n\t\t\t\t\t<div class=\"copy_medium\" style=\"width:100%; max-width:450px\">Datenverschl\u00fcsselung sch\u00fctzt sensible Informationen \u2013 doch viele Unternehmen sichern nur Speicherung und \u00dcbertragung ab. Entscheidend f\u00fcr echte Datensicherheit ist jedoch die dritte Ebene: Data-in-Use, also der Schutz w\u00e4hrend der Verarbeitung.<\/div>\n\t\t\t\t\t<div class=\"top_margin_24 stageLinks\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div style=\"position:absolute; top:0px; left:0px; background-color:#00B4B4; width:4px; height:24px; border-radius: 0 0 4px 0\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"teaserImage\">\n\t\t\t\t<div><img decoding=\"async\" src=\"https:\/\/eperi.com\/wp-content\/uploads\/2024\/04\/Graphic.png\" alt=\"\" class=\"default_image border_radius_24\"><\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-066a4da e-flex e-con-boxed e-con e-parent\" data-id=\"066a4da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0841647 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0841647\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9805088 e-con-full e-flex e-con e-child\" data-id=\"9805088\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55df0c7 elementor-widget elementor-widget-post-info\" data-id=\"55df0c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-7065232 elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t<a href=\"https:\/\/eperi.com\/de\/author\/ricardo-izzieperi-com\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-pen-nib\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t\t\t\tRicardo Izzi\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-432626c elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/eperi.com\/de\/2025\/10\/07\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar-alt\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>Oktober 7, 2025<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-391e0d6 elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-tags\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/eperi.com\/de\/category\/newsroom\/blog\/\" class=\"elementor-post-info__terms-list-item\">blog<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d180988 elementor-widget elementor-widget-betterdocs-reading-time\" data-id=\"d180988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"betterdocs-reading-time.default\">\n\t\t\t\t\t<div class=\"reading-time betterdocs\">\n\t<p>\n\t\t<svg width=\"14\" viewBox=\"0 0 14 15\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t<mask id=\"mask0_6195_23752\" style=\"mask-type:alpha\" maskUnits=\"userSpaceOnUse\" x=\"0\" y=\"0\">\n\t\t\t<rect y=\"0.5\" width=\"14\" height=\"14\" fill=\"#D9D9D9\"\/>\n\t\t\t<\/mask>\n\t\t\t<g mask=\"url(#mask0_6195_23752)\">\n\t\t\t<path d=\"M8.92508 10.241L9.74175 9.42435L7.58341 7.26602V4.58268H6.41675V7.73268L8.92508 10.241ZM7.00008 13.3327C6.19314 13.3327 5.4348 13.1796 4.72508 12.8733C4.01536 12.5671 3.398 12.1514 2.873 11.6264C2.348 11.1014 1.93237 10.4841 1.62612 9.77435C1.31987 9.06463 1.16675 8.30629 1.16675 7.49935C1.16675 6.6924 1.31987 5.93407 1.62612 5.22435C1.93237 4.51463 2.348 3.89727 2.873 3.37227C3.398 2.84727 4.01536 2.43164 4.72508 2.12539C5.4348 1.81914 6.19314 1.66602 7.00008 1.66602C7.80703 1.66602 8.56536 1.81914 9.27508 2.12539C9.9848 2.43164 10.6022 2.84727 11.1272 3.37227C11.6522 3.89727 12.0678 4.51463 12.374 5.22435C12.6803 5.93407 12.8334 6.6924 12.8334 7.49935C12.8334 8.30629 12.6803 9.06463 12.374 9.77435C12.0678 10.4841 11.6522 11.1014 11.1272 11.6264C10.6022 12.1514 9.9848 12.5671 9.27508 12.8733C8.56536 13.1796 7.80703 13.3327 7.00008 13.3327ZM7.00008 12.166C8.29314 12.166 9.39418 11.7115 10.3032 10.8025C11.2122 9.89345 11.6667 8.7924 11.6667 7.49935C11.6667 6.20629 11.2122 5.10525 10.3032 4.19622C9.39418 3.2872 8.29314 2.83268 7.00008 2.83268C5.70703 2.83268 4.60598 3.2872 3.69696 4.19622C2.78793 5.10525 2.33341 6.20629 2.33341 7.49935C2.33341 8.7924 2.78793 9.89345 3.69696 10.8025C4.60598 11.7115 5.70703 12.166 7.00008 12.166Z\" fill=\"#667085\"\/>\n\t\t\t<\/g>\n\t\t<\/svg>\n\t\t7 min\t<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffc66b5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ffc66b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3cc01c0 e-flex e-con-boxed e-con e-parent\" data-id=\"3cc01c0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8b4083c e-con-full e-flex e-con e-child\" data-id=\"8b4083c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bff4b87 elementor-widget elementor-widget-richText\" data-id=\"bff4b87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>Drei Ebenen der Datenverschl\u00fcsselung \u2013 und warum Data-in-Use den Unterschied macht<\/h2><p>Datenverschl\u00fcsselung ist ein Kernelement moderner IT-Sicherheit. Doch viele L\u00f6sungen beschr\u00e4nken sich auf den Schutz bei Speicherung und \u00dcbertragung \u2013 und lassen eine kritische Schwachstelle offen: <strong>die Verarbeitungsebene<\/strong>. Genau hier setzen moderne Bedrohungen an, insbesondere im Cloud- und SaaS-Kontext.<\/p><p>Grund genug, uns dem Thema in unserer Cybersecurity Academy im Rahmen des Cybersecurity Awareness Month anzunehmen und \u00fcber die verschiedenen Ebenen von Verschl\u00fcsselung aufzukl\u00e4ren.<\/p><p>Die Unterscheidung zwischen <strong>Data-at-Rest<\/strong>, <strong>Data-in-Transit<\/strong> und <strong>Data-in-Use<\/strong> ist entscheidend, um Sicherheitsl\u00fccken zu erkennen und gezielt zu schlie\u00dfen.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b074211 elementor-widget elementor-widget-richText\" data-id=\"b074211\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>1. Data-at-Rest: Verschl\u00fcsselung gespeicherter Daten<\/h2><p><br \/><strong>Definition:<\/strong><br \/>Data-at-Rest umfasst alle Daten, die in ruhendem Zustand gespeichert sind \u2013 etwa auf Festplatten, in Datenbanken oder Cloud-Speichern.<\/p><p><strong>Ziel:<\/strong><br \/>Verhinderung unbefugten Zugriffs bei Verlust, Diebstahl oder physischem Zugriff auf das Speichermedium.<\/p><p><strong>Grenzen:<\/strong><br \/>In laufenden Systemen liegt ein Gro\u00dfteil der Daten im Klartext vor. Angreifer mit privilegiertem Zugriff (z. B. Insider oder kompromittierte Admins) k\u00f6nnen diese dennoch einsehen.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c689717 elementor-widget elementor-widget-richText\" data-id=\"c689717\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>2. Data-in-Transit: Verschl\u00fcsselung bei der Daten\u00fcbertragung<\/h2><p><br \/><strong>Definition:<\/strong><br \/>Data-in-Transit bezeichnet Daten, die \u00fcber Netzwerke (z. B. Internet, VPN, interne Netze) \u00fcbertragen werden.<\/p><p><strong>Ziel:<\/strong><br \/>Schutz vor Abh\u00f6ren, Man-in-the-Middle-Angriffen oder Manipulation w\u00e4hrend der \u00dcbertragung.<br \/>Technologien:<br \/>TLS\/SSL (HTTPS), VPN, SFTP<\/p><p><strong>Grenzen:<\/strong><br \/>Sobald Daten ihr Zielsystem erreichen, werden sie entschl\u00fcsselt \u2013 und sind dort erneut im Klartext verf\u00fcgbar.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-747c1e0 elementor-widget elementor-widget-richText\" data-id=\"747c1e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>3. Data-in-Use: Verschl\u00fcsselung w\u00e4hrend der Verarbeitung<\/h2><p><br \/><strong>Definition:<\/strong><br \/>Data-in-Use beschreibt Daten, die gerade verarbeitet, angezeigt oder genutzt werden \u2013 zum Beispiel in einer Web-App, einem CRM-System oder einem KI-Modell.<\/p><p><strong>Herausforderung:<\/strong><br \/>In dieser Phase greift herk\u00f6mmliche Verschl\u00fcsselung nicht. Daten m\u00fcssen entschl\u00fcsselt werden, um verarbeitet zu werden \u2013 genau hier entstehen neue Angriffsvektoren.<\/p><p><strong>Moderne L\u00f6sungsans\u00e4tze:<\/strong><\/p><ul><li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Selektive Verschl\u00fcsselung<br \/>Kritische Felder (z.\u202fB. IBAN, Kundennamen, Gesundheitsdaten) werden gezielt verschl\u00fcsselt. Die Anwendung bleibt voll funktionsf\u00e4hig \u2013 auch mit verschl\u00fcsselten Inhalten.<\/li><li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Trusted Execution Environments (TEE)<br \/>Daten werden in speziell gesicherten Hardware-Bereichen verarbeitet, die selbst f\u00fcr Administratoren unzug\u00e4nglich sind. Besonders relevant f\u00fcr Public-Cloud-Umgebungen.<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e9225f elementor-widget elementor-widget-richText\" data-id=\"4e9225f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>eperi\u00ae sEcure: Schutz bis zur Nutzungsebene<\/h2><p><br \/>eperi\u00ae sEcure adressiert alle drei Ebenen der Verschl\u00fcsselung in einer integrierten L\u00f6sung:<\/p><ul><li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Daten werden vor der Cloud verschl\u00fcsselt<\/li><li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Klartextzugriffe durch Dritte \u2013 einschlie\u00dflich SaaS-Anbieter \u2013 sind ausgeschlossen<\/li><li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Die L\u00f6sung ist transparent f\u00fcr Anwender und Anwendungen<\/li><\/ul><p><strong>Kompatibel mit:<\/strong> Microsoft 365, Salesforce, ServiceNow, Hubspot, u.\u202fv.\u202fm.<\/p><p><strong>Hilft bei der Erf\u00fcllung internationaler Standards:<\/strong> DSGVO, DORA, PCI-DSS, ISO\/IEC 27001, PII<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85ada7e elementor-widget elementor-widget-richText\" data-id=\"85ada7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>Warum Data-in-Use-Verschl\u00fcsselung entscheidend f\u00fcr echte Datensicherheit ist<\/h2><p><br \/>Viele Unternehmen verlassen sich auf Transport- und Speicherverschl\u00fcsselung. Doch moderne Angriffe zielen auf den Moment der Nutzung. Besonders in Cloud-Umgebungen, wo Anwendungen zentral gehostet sind und Daten geteilt verarbeitet werden, ist dies die gr\u00f6\u00dfte Schwachstelle.<br \/>Nur wer <strong>Data-in-Use<\/strong> aktiv sch\u00fctzt, erzielt:<\/p><ul><li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Sicherheitskontrolle \u00fcber den gesamten Datenlebenszyklus<\/li><li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Minimierung von Zero-Day-Risiken und Insiderbedrohungen<\/li><li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Erf\u00fcllung regulatorischer Anforderungen, die Verarbeitungssicherheit fordern<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03390a5 elementor-widget elementor-widget-richText\" data-id=\"03390a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>FAQ: Drei Ebenen der Verschl\u00fcsselung einfach erkl\u00e4rt<\/h2><p><br \/><strong>Was ist der Unterschied zwischen Data-at-Rest, in-Transit und in-Use?<\/strong><\/p><ul><li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>At-Rest: Speicherung<\/li><li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>In-Transit: \u00dcbertragung<\/li><li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>In-Use: Verarbeitung <br \/>Jede Ebene ben\u00f6tigt eigene Schutzmechanismen.<\/li><\/ul><p><strong>Warum ist Data-in-Use der kritischste Bereich?<\/strong><br \/>Weil hier Daten im Klartext vorliegen m\u00fcssen \u2013 es sei denn, moderne Verfahren wie selektive Verschl\u00fcsselung oder TEE werden eingesetzt.<\/p><p><strong>Wie hilft eperi\u00ae sEcure dabei?<\/strong><br \/>Durch clientseitige, feldbasierte Verschl\u00fcsselung vor der Cloud. Daten bleiben selbst bei SaaS-Nutzung vertraulich \u2013 ohne Funktionseinbu\u00dfen.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f206c7 e-con-full e-flex e-con e-child\" data-id=\"5f206c7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-24eae4f elementor-widget elementor-widget-richText\" data-id=\"24eae4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>Hat Ihnen dieser Artikel gefallen?<\/h2><p><br \/>Dann jetzt liken oder mit Kollegen, Gesch\u00e4ftspartnern sowie Freunden teilen.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d133695 e-grid e-con-full e-con e-child\" data-id=\"d133695\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-32c7b58 elementor-share-buttons--shape-rounded elementor-share-buttons--view-icon-text elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"32c7b58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_email\" role=\"button\" tabindex=\"0\" aria-label=\"Share on email\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fas fa-envelope\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Share on facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tFacebook\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Share on linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tLinkedIn\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_x-twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Share on x-twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-x-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tX\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed53ce1 elementor-widget elementor-widget-shortcode\" data-id=\"ed53ce1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div class=\"wpulike wpulike-default \" ><div class=\"wp_ulike_general_class wp_ulike_is_restricted\"><button type=\"button\"\n\t\t\t\t\taria-label=\"Like Button\"\n\t\t\t\t\tdata-ulike-id=\"11830\"\n\t\t\t\t\tdata-ulike-nonce=\"068b9e2c23\"\n\t\t\t\t\tdata-ulike-type=\"post\"\n\t\t\t\t\tdata-ulike-template=\"wpulike-default\"\n\t\t\t\t\tdata-ulike-display-likers=\"0\"\n\t\t\t\t\tdata-ulike-likers-style=\"default\"\n\t\t\t\t\tclass=\"wp_ulike_btn wp_ulike_put_image wp_post_btn_11830\"><\/button><span class=\"count-box wp_ulike_counter_up\" data-ulike-counter-value=\"0\"><\/span>\t\t\t<\/div><\/div>\n\t\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-59262833 e-flex e-con-boxed e-con e-parent\" data-id=\"59262833\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2b5cfda6 e-grid e-con-boxed e-con e-child\" data-id=\"2b5cfda6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-59c84c14 e-con-full e-flex e-con e-child\" data-id=\"59c84c14\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-216912f0 elementor-widget elementor-widget-h2\" data-id=\"216912f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"h2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <!-- <div style=\"background-color:red; color:white; display:inline; padding:0px 5px\">H2 Headline<\/div> -->\n        <h2 class=\"title_size_2 headline-color\">Wissen, das sch\u00fctzt \u2013 Ihre n\u00e4chste Ma\u00dfnahme f\u00fcr mehr Datensicherheit<\/h2>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e268cf7 elementor-widget elementor-widget-richText\" data-id=\"e268cf7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><p>Auf unserer Download-Seite finden Sie kostenlose Whitepaper und Factsheets zu Datenschutz, Datenverschl\u00fcsselung und Compliance \u2013 speziell f\u00fcr IT-Verantwortliche und Entscheider.<\/p><p>Erhalten Sie kompaktes Wissen, strategische Empfehlungen und praktische Tipps, um Ihre Daten effektiv zu sch\u00fctzen und regulatorische Vorgaben wie DSGVO, NIS2 und DORA sicher zu erf\u00fcllen.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1897c014 elementor-widget elementor-widget-primaryButton\" data-id=\"1897c014\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"primaryButton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n                    <div class=\"button button_light_primary\">\n                                <a href=\"https:\/\/eperi.com\/de\/whitepaper-quantenbedrohung-voraus\/\" class=\"button_link\" id=\"\">\n                    Jetzt informieren &amp; kostenlos herunterladen                <\/a>\n            <\/div>\n        \n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11b24f34 elementor-widget elementor-widget-image\" data-id=\"11b24f34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<!-- <div style=\"background-color:red; color:white; display:inline; padding:0px 5px\">Image<\/div> -->\n\t\t<img decoding=\"async\" src=\"https:\/\/eperi.com\/wp-content\/uploads\/2025\/04\/Whitepaper_Ganzheitliche_Cloud_Datenschutz_A4_Brochure_Mockup_2-scaled.webp\" alt=\"\" class=\"default_image border_radius_24\">\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Data encryption spans three layers: data-at-rest (stored data), data-in-transit (transferred data), and data-in-use (processed data). While traditional technologies focus on storage and transport encryption, eperi\u00ae sEcure extends protection to the processing layer \u2013 using client-side encryption before the cloud and selective field-level encryption. This ensures full application compatibility without compromising data security.<\/p>\n","protected":false},"author":6,"featured_media":11832,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[13],"tags":[],"class_list":["post-11841","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data-at-Rest, in-Transit &amp; in-Use<\/title>\n<meta name=\"description\" content=\"Wie sch\u00fctzt Verschl\u00fcsselung Daten bei Speicherung, \u00dcbertragung und Nutzung? \u00dcberblick \u00fcber die drei Ebenen und wie eperi\u00ae sEcure echten Datenschutz bis in SaaS-Systeme bringt.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data-at-Rest, in-Transit &amp; in-Use\" \/>\n<meta property=\"og:description\" content=\"Wie sch\u00fctzt Verschl\u00fcsselung Daten bei Speicherung, \u00dcbertragung und Nutzung? \u00dcberblick \u00fcber die drei Ebenen und wie eperi\u00ae sEcure echten Datenschutz bis in SaaS-Systeme bringt.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/\" \/>\n<meta property=\"og:site_name\" content=\"EPERI\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-07T13:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eperi.com\/wp-content\/uploads\/2025\/09\/Cybersecurity-academy-visual-blog-eperi.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ricardo Izzi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ricardo Izzi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/\"},\"author\":{\"name\":\"Ricardo Izzi\",\"@id\":\"https:\/\/eperi.com\/de\/#\/schema\/person\/44a9b3a3f683b96f301707dfdd95fcff\"},\"headline\":\"Data-at-Rest, in-Transit &amp; in-Use: Verschl\u00fcsselung ganzheitlich verstehen und anwenden\",\"datePublished\":\"2025-10-07T13:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/\"},\"wordCount\":684,\"publisher\":{\"@id\":\"https:\/\/eperi.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eperi.com\/wp-content\/uploads\/2025\/09\/Cybersecurity-academy-visual-blog-eperi.jpg\",\"articleSection\":[\"blog\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/\",\"url\":\"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/\",\"name\":\"Data-at-Rest, in-Transit & in-Use\",\"isPartOf\":{\"@id\":\"https:\/\/eperi.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eperi.com\/wp-content\/uploads\/2025\/09\/Cybersecurity-academy-visual-blog-eperi.jpg\",\"datePublished\":\"2025-10-07T13:00:00+00:00\",\"description\":\"Wie sch\u00fctzt Verschl\u00fcsselung Daten bei Speicherung, \u00dcbertragung und Nutzung? \u00dcberblick \u00fcber die drei Ebenen und wie eperi\u00ae sEcure echten Datenschutz bis in SaaS-Systeme bringt.\",\"breadcrumb\":{\"@id\":\"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/#primaryimage\",\"url\":\"https:\/\/eperi.com\/wp-content\/uploads\/2025\/09\/Cybersecurity-academy-visual-blog-eperi.jpg\",\"contentUrl\":\"https:\/\/eperi.com\/wp-content\/uploads\/2025\/09\/Cybersecurity-academy-visual-blog-eperi.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/eperi.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data-at-Rest, in-Transit &amp; in-Use: Verschl\u00fcsselung ganzheitlich verstehen und anwenden\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/eperi.com\/de\/#website\",\"url\":\"https:\/\/eperi.com\/de\/\",\"name\":\"EPERI\",\"description\":\"Empower your Data. Keep control.\",\"publisher\":{\"@id\":\"https:\/\/eperi.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/eperi.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/eperi.com\/de\/#organization\",\"name\":\"EPERI\",\"url\":\"https:\/\/eperi.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/eperi.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/eperi.com\/wp-content\/uploads\/2024\/07\/cropped-cropped-LogoEperi.png\",\"contentUrl\":\"https:\/\/eperi.com\/wp-content\/uploads\/2024\/07\/cropped-cropped-LogoEperi.png\",\"width\":512,\"height\":512,\"caption\":\"EPERI\"},\"image\":{\"@id\":\"https:\/\/eperi.com\/de\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/eperi.com\/de\/#\/schema\/person\/44a9b3a3f683b96f301707dfdd95fcff\",\"name\":\"Ricardo Izzi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g\",\"caption\":\"Ricardo Izzi\"},\"url\":\"https:\/\/eperi.com\/de\/author\/ricardo-izzieperi-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data-at-Rest, in-Transit & in-Use","description":"Wie sch\u00fctzt Verschl\u00fcsselung Daten bei Speicherung, \u00dcbertragung und Nutzung? \u00dcberblick \u00fcber die drei Ebenen und wie eperi\u00ae sEcure echten Datenschutz bis in SaaS-Systeme bringt.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/","og_locale":"de_DE","og_type":"article","og_title":"Data-at-Rest, in-Transit & in-Use","og_description":"Wie sch\u00fctzt Verschl\u00fcsselung Daten bei Speicherung, \u00dcbertragung und Nutzung? \u00dcberblick \u00fcber die drei Ebenen und wie eperi\u00ae sEcure echten Datenschutz bis in SaaS-Systeme bringt.","og_url":"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/","og_site_name":"EPERI","article_published_time":"2025-10-07T13:00:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/eperi.com\/wp-content\/uploads\/2025\/09\/Cybersecurity-academy-visual-blog-eperi.jpg","type":"image\/jpeg"}],"author":"Ricardo Izzi","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Ricardo Izzi","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/#article","isPartOf":{"@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/"},"author":{"name":"Ricardo Izzi","@id":"https:\/\/eperi.com\/de\/#\/schema\/person\/44a9b3a3f683b96f301707dfdd95fcff"},"headline":"Data-at-Rest, in-Transit &amp; in-Use: Verschl\u00fcsselung ganzheitlich verstehen und anwenden","datePublished":"2025-10-07T13:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/"},"wordCount":684,"publisher":{"@id":"https:\/\/eperi.com\/de\/#organization"},"image":{"@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/#primaryimage"},"thumbnailUrl":"https:\/\/eperi.com\/wp-content\/uploads\/2025\/09\/Cybersecurity-academy-visual-blog-eperi.jpg","articleSection":["blog"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/","url":"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/","name":"Data-at-Rest, in-Transit & in-Use","isPartOf":{"@id":"https:\/\/eperi.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/#primaryimage"},"image":{"@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/#primaryimage"},"thumbnailUrl":"https:\/\/eperi.com\/wp-content\/uploads\/2025\/09\/Cybersecurity-academy-visual-blog-eperi.jpg","datePublished":"2025-10-07T13:00:00+00:00","description":"Wie sch\u00fctzt Verschl\u00fcsselung Daten bei Speicherung, \u00dcbertragung und Nutzung? \u00dcberblick \u00fcber die drei Ebenen und wie eperi\u00ae sEcure echten Datenschutz bis in SaaS-Systeme bringt.","breadcrumb":{"@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/#primaryimage","url":"https:\/\/eperi.com\/wp-content\/uploads\/2025\/09\/Cybersecurity-academy-visual-blog-eperi.jpg","contentUrl":"https:\/\/eperi.com\/wp-content\/uploads\/2025\/09\/Cybersecurity-academy-visual-blog-eperi.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/data-at-rest\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/eperi.com\/de\/"},{"@type":"ListItem","position":2,"name":"Data-at-Rest, in-Transit &amp; in-Use: Verschl\u00fcsselung ganzheitlich verstehen und anwenden"}]},{"@type":"WebSite","@id":"https:\/\/eperi.com\/de\/#website","url":"https:\/\/eperi.com\/de\/","name":"EPERI","description":"Empower your Data. Keep control.","publisher":{"@id":"https:\/\/eperi.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eperi.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/eperi.com\/de\/#organization","name":"EPERI","url":"https:\/\/eperi.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/eperi.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/eperi.com\/wp-content\/uploads\/2024\/07\/cropped-cropped-LogoEperi.png","contentUrl":"https:\/\/eperi.com\/wp-content\/uploads\/2024\/07\/cropped-cropped-LogoEperi.png","width":512,"height":512,"caption":"EPERI"},"image":{"@id":"https:\/\/eperi.com\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eperi.com\/de\/#\/schema\/person\/44a9b3a3f683b96f301707dfdd95fcff","name":"Ricardo Izzi","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g","caption":"Ricardo Izzi"},"url":"https:\/\/eperi.com\/de\/author\/ricardo-izzieperi-com\/"}]}},"_links":{"self":[{"href":"https:\/\/eperi.com\/de\/wp-json\/wp\/v2\/posts\/11841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eperi.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eperi.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eperi.com\/de\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/eperi.com\/de\/wp-json\/wp\/v2\/comments?post=11841"}],"version-history":[{"count":2,"href":"https:\/\/eperi.com\/de\/wp-json\/wp\/v2\/posts\/11841\/revisions"}],"predecessor-version":[{"id":12178,"href":"https:\/\/eperi.com\/de\/wp-json\/wp\/v2\/posts\/11841\/revisions\/12178"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eperi.com\/de\/wp-json\/wp\/v2\/media\/11832"}],"wp:attachment":[{"href":"https:\/\/eperi.com\/de\/wp-json\/wp\/v2\/media?parent=11841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eperi.com\/de\/wp-json\/wp\/v2\/categories?post=11841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eperi.com\/de\/wp-json\/wp\/v2\/tags?post=11841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}