{"id":114502,"date":"2025-07-03T10:00:42","date_gmt":"2025-07-03T10:00:42","guid":{"rendered":"https:\/\/wp.eastgate-software.com\/?p=114502"},"modified":"2026-04-01T15:23:16","modified_gmt":"2026-04-01T08:23:16","slug":"shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems","status":"publish","type":"post","link":"https:\/\/wp.eastgate-software.com\/de\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\/","title":{"rendered":"Schatten-KI entwickelt sich zu einer Cybersicherheitsbedrohung in SaaS-\u00d6kosystemen"},"content":{"rendered":"<p data-start=\"430\" data-end=\"741\">Mit der zunehmenden Verbreitung generativer KI-Tools in Gesch\u00e4ftsumgebungen entsteht ein neues Cybersicherheitsrisiko: Schatten-KI. Anders als bei der traditionellen Schatten-IT bezeichnet Schatten-KI die nicht genehmigte und oft verdeckte Nutzung von KI-Tools am Arbeitsplatz \u2013 darunter ChatGPT, Code-Assistenten und in SaaS-Plattformen eingebettete KI.<\/p>\n<p data-start=\"743\" data-end=\"963\">Laut Melissa Ruzzi, Leiterin der KI-Abteilung des SaaS-Sicherheitsunternehmens AppOmni, birgt Schatten-KI gr\u00f6\u00dfere Risiken als Schatten-IT. Diese Tools haben oft umfassenden Zugriff auf sensible Unternehmensdaten. Im Falle eines Datenlecks k\u00f6nnen die Folgen gravierend sein. Besonders gef\u00e4hrlich an Schatten-KI ist ihre Unsichtbarkeit. Viele generative KI-Tools sind in genehmigte Anwendungen eingebettet oder werden \u00fcber Drittanbieterplattformen genutzt. Herk\u00f6mmliche Sicherheitssysteme wie CASBs (Cloud Access Security Broker) erkennen sie unter Umst\u00e4nden nicht.<\/p>\n<p data-start=\"1266\" data-end=\"1563\">Ruzzi warnt davor, dass diesen Tools oft grundlegende Kontrollmechanismen f\u00fcr Governance und Sicherheit fehlen. Sie k\u00f6nnen versehentlich auf personenbezogene und gesundheitsbezogene Daten zugreifen oder diese offenlegen und Unternehmen so dem Risiko aussetzen, gegen wichtige Datenschutzgesetze zu versto\u00dfen. Dazu geh\u00f6ren die EU-DSGVO, der kalifornische CCPA und CPRA sowie der US-amerikanische HIPAA. Schatten-KI kann leicht gegen zentrale Datenschutzprinzipien versto\u00dfen. Dazu z\u00e4hlen Datenminimierung, Zweckbindung und angemessener Schutz sensibler Daten. Bleibt dies unkontrolliert, kann es zu Klagen, Bu\u00dfgeldern oder Imagesch\u00e4den aufgrund von Verst\u00f6\u00dfen gegen regulatorische Bestimmungen kommen.<\/p>\n<p data-start=\"1887\" data-end=\"2195\">Um diesen Risiken zu begegnen, m\u00fcssen Unternehmen proaktiv handeln. Ruzzi empfiehlt den Einsatz fortschrittlicher SaaS-Sicherheitstools, die Anwendungskonfigurationen scannen und unautorisierte KI-Nutzung erkennen. Mitarbeiterschulungen sind ebenfalls unerl\u00e4sslich. Die Mitarbeiter sollten die Gefahren der Nutzung nicht genehmigter KI verstehen und klare interne Richtlinien befolgen. Da KI zunehmend in die t\u00e4glichen Arbeitsabl\u00e4ufe integriert wird, m\u00fcssen Unternehmen neuen Bedrohungen einen Schritt voraus sein. Der Umgang mit Schatten-KI ist nicht l\u00e4nger optional, sondern ein notwendiger Schritt, um Daten zu sch\u00fctzen, Compliance zu gew\u00e4hrleisten und Vertrauen in der heutigen KI-gest\u00fctzten digitalen Welt zu schaffen.<\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Quelle:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.technewsworld.com\/story\/beyond-chatgpt-shadow-ai-risks-lurk-in-saas-tools-179806.html\"><span data-contrast=\"none\">https:\/\/www.technewsworld.com\/story\/beyond-chatgpt-shadow-ai-risks-lurk-in-saas-tools-179806.html<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Mit der zunehmenden Verbreitung generativer KI-Tools in Gesch\u00e4ftsumgebungen entsteht ein neues Cybersicherheitsrisiko: Schatten-KI. Anders als bei der traditionellen Schatten-IT bezeichnet Schatten-KI die nicht genehmigte und oft verdeckte Nutzung von KI-Tools am Arbeitsplatz \u2013 darunter ChatGPT, Code-Assistenten und in SaaS-Plattformen eingebettete KI. Laut Melissa Ruzzi, Direktorin von [\u2026]<\/p>","protected":false},"author":238283293,"featured_media":114506,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1584],"tags":[1488,1538,1550],"class_list":["post-114502","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-enthusiast","tag-ai","tag-cybersecurity","tag-generative-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Shadow AI Emerges as Cybersecurity Threat in SaaS Ecosystems - Eastgate Software<\/title>\n<meta name=\"description\" content=\"As generative AI tools proliferate in the enterprise landscape, a growing cybersecurity concern has taken center stage: shadow AI.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shadow AI Emerges as Cybersecurity Threat in SaaS Ecosystems\" \/>\n<meta property=\"og:description\" content=\"As generative AI tools proliferate in the enterprise landscape, a growing cybersecurity concern has taken center stage: shadow AI.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wp.eastgate-software.com\/de\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\/\" \/>\n<meta property=\"og:site_name\" content=\"Eastgate Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EastgateSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-03T10:00:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T08:23:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/06\/undefined-3.webp?fit=624%2C351&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"624\" \/>\n\t<meta property=\"og:image:height\" content=\"351\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"huongnguyen253\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:site\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"huongnguyen253\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\\\/\"},\"author\":{\"name\":\"huongnguyen253\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\"},\"headline\":\"Shadow AI Emerges as Cybersecurity Threat in SaaS Ecosystems\",\"datePublished\":\"2025-07-03T10:00:42+00:00\",\"dateModified\":\"2026-04-01T08:23:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\\\/\"},\"wordCount\":309,\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/undefined-3.webp?fit=624%2C351&ssl=1\",\"keywords\":[\"Ai\",\"cybersecurity\",\"generative AI\"],\"articleSection\":[\"Tech Enthusiast\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\\\/\",\"name\":\"Shadow AI Emerges as Cybersecurity Threat in SaaS Ecosystems - Eastgate Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/undefined-3.webp?fit=624%2C351&ssl=1\",\"datePublished\":\"2025-07-03T10:00:42+00:00\",\"dateModified\":\"2026-04-01T08:23:16+00:00\",\"description\":\"As generative AI tools proliferate in the enterprise landscape, a growing cybersecurity concern has taken center stage: shadow AI.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wp.eastgate-software.com\\\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/undefined-3.webp?fit=624%2C351&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/undefined-3.webp?fit=624%2C351&ssl=1\",\"width\":624,\"height\":351,\"caption\":\"Shadow AI Emerges as a Major Cybersecurity Threat in SaaS Ecosystems\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shadow AI Emerges as Cybersecurity Threat in SaaS Ecosystems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"name\":\"Eastgate Software\",\"description\":\"A Global Fortune 500 Company&#039;s Strategic Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wp.eastgate-software.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\",\"name\":\"Eastgate Software\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"width\":124,\"height\":36,\"caption\":\"Eastgate Software\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EastgateSoftware\\\/\",\"https:\\\/\\\/x.com\\\/EastgateSoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\",\"name\":\"huongnguyen253\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"caption\":\"huongnguyen253\"},\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/de\\\/author\\\/huongnguyen253\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Schatten-KI entwickelt sich zu einer Cybersicherheitsbedrohung in SaaS-\u00d6kosystemen \u2013 Eastgate Software","description":"Mit der zunehmenden Verbreitung von generativen KI-Tools in Unternehmen r\u00fcckt ein wachsendes Cybersicherheitsproblem in den Mittelpunkt: Schatten-KI.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"Shadow AI Emerges as Cybersecurity Threat in SaaS Ecosystems","og_description":"As generative AI tools proliferate in the enterprise landscape, a growing cybersecurity concern has taken center stage: shadow AI.","og_url":"https:\/\/wp.eastgate-software.com\/de\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\/","og_site_name":"Eastgate Software","article_publisher":"https:\/\/www.facebook.com\/EastgateSoftware\/","article_published_time":"2025-07-03T10:00:42+00:00","article_modified_time":"2026-04-01T08:23:16+00:00","og_image":[{"width":624,"height":351,"url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/06\/undefined-3.webp?fit=624%2C351&ssl=1","type":"image\/webp"}],"author":"huongnguyen253","twitter_card":"summary_large_image","twitter_creator":"@EastgateSoft","twitter_site":"@EastgateSoft","twitter_misc":{"Verfasst von":"huongnguyen253","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wp.eastgate-software.com\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\/#article","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\/"},"author":{"name":"huongnguyen253","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a"},"headline":"Shadow AI Emerges as Cybersecurity Threat in SaaS Ecosystems","datePublished":"2025-07-03T10:00:42+00:00","dateModified":"2026-04-01T08:23:16+00:00","mainEntityOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\/"},"wordCount":309,"publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/06\/undefined-3.webp?fit=624%2C351&ssl=1","keywords":["Ai","cybersecurity","generative AI"],"articleSection":["Tech Enthusiast"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/wp.eastgate-software.com\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\/","url":"https:\/\/wp.eastgate-software.com\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\/","name":"Schatten-KI entwickelt sich zu einer Cybersicherheitsbedrohung in SaaS-\u00d6kosystemen \u2013 Eastgate Software","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\/#primaryimage"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/06\/undefined-3.webp?fit=624%2C351&ssl=1","datePublished":"2025-07-03T10:00:42+00:00","dateModified":"2026-04-01T08:23:16+00:00","description":"Mit der zunehmenden Verbreitung von generativen KI-Tools in Unternehmen r\u00fcckt ein wachsendes Cybersicherheitsproblem in den Mittelpunkt: Schatten-KI.","breadcrumb":{"@id":"https:\/\/wp.eastgate-software.com\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wp.eastgate-software.com\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/wp.eastgate-software.com\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\/#primaryimage","url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/06\/undefined-3.webp?fit=624%2C351&ssl=1","contentUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/06\/undefined-3.webp?fit=624%2C351&ssl=1","width":624,"height":351,"caption":"Shadow AI Emerges as a Major Cybersecurity Threat in SaaS Ecosystems"},{"@type":"BreadcrumbList","@id":"https:\/\/wp.eastgate-software.com\/shadow-ai-emerges-as-a-major-cybersecurity-threat-in-saas-ecosystems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wp.eastgate-software.com\/"},{"@type":"ListItem","position":2,"name":"Shadow AI Emerges as Cybersecurity Threat in SaaS Ecosystems"}]},{"@type":"WebSite","@id":"https:\/\/wp.eastgate-software.com\/#website","url":"https:\/\/wp.eastgate-software.com\/","name":"Eastgate Software","description":"Strategischer Partner eines globalen Fortune-500-Unternehmens","publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.eastgate-software.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/wp.eastgate-software.com\/#organization","name":"Eastgate Software","url":"https:\/\/wp.eastgate-software.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/","url":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","contentUrl":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","width":124,"height":36,"caption":"Eastgate Software"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EastgateSoftware\/","https:\/\/x.com\/EastgateSoft"]},{"@type":"Person","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a","name":"huongnguyen253","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","caption":"huongnguyen253"},"url":"https:\/\/wp.eastgate-software.com\/de\/author\/huongnguyen253\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/06\/undefined-3.webp?fit=624%2C351&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pf8Ne8-tMO","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/114502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/users\/238283293"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/comments?post=114502"}],"version-history":[{"count":7,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/114502\/revisions"}],"predecessor-version":[{"id":119943,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/114502\/revisions\/119943"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/media\/114506"}],"wp:attachment":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/media?parent=114502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/categories?post=114502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/tags?post=114502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}