{"id":59748,"date":"2024-05-08T14:56:20","date_gmt":"2024-05-08T14:56:20","guid":{"rendered":"https:\/\/syndigo.com\/?p=59748"},"modified":"2024-05-09T04:51:59","modified_gmt":"2024-05-09T04:51:59","slug":"securing-mdm-safeguarding-data","status":"publish","type":"post","link":"https:\/\/syndigo.com\/fr\/blog\/securing-mdm-safeguarding-data\/","title":{"rendered":"Is Your MDM Ready to Endure The Privacy and Security Threats of the Future?"},"content":{"rendered":"\n<p>In the digital age, where data is the new currency and connectivity is ubiquitous, the twin pillars of privacy and security stand as sentinel guardians of a competitive business landscape. When information flows freely and cyber threats lurk around every digital corner, businesses face a dual imperative: safeguarding the confidentiality of sensitive data while fortifying their defenses against potential breaches.<\/p>\n\n\n\n<p>Privacy and security are not merely regulatory checkboxes or operational niceties; they are existential imperatives that can make or break a company&#8217;s reputation, bottom line, and long-term viability. From protecting customer trust and brand integrity to preserving intellectual property and maintaining regulatory compliance, privacy and security matter deeply to any business striving to thrive and succeed in today&#8217;s fiercely competitive marketplace.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-importance-of-ensuring-the-privacy-of-your-data\">Importance of ensuring the privacy of your data<\/h2>\n\n\n\n<p>Lapses in data security can be and crippling for businesses. According to a report by Cybersecurity Ventures, global cybercrime is projected to cost businesses over $10 trillion annually by 2025, up from $3 trillion in 2015. But beyond the immediate operational reasons, there are two important strategic reasons why it is important to ensure that your data is secure and that access to it is restricted only to those who are permitted to access it.<\/p>\n\n\n\n<ul class=\"checkmark-list wp-block-list\">\n<li class=\"checkmark-list\"><strong>Trust and Reputation<\/strong>: Maintaining customer privacy builds trust. A survey by Edelman found that 81% of consumers say that trusting a brand to do the right thing with their data is a deciding factor in their purchasing decisions. Customers are more likely to engage with and remain loyal to businesses they trust with their personal information. A breach of privacy can lead to a loss of reputation, which can be difficult to recover from.<\/li>\n\n\n\n<li><strong>Legal Compliance<\/strong>: Many jurisdictions have stringent regulations regarding the collection, storage, and use of personal data, such as the General Data Protection Regulation (GDPR) in the European Union and the California Consumer Privacy Act (CCPA) in the United States. Failure to comply with these regulations can result in severe penalties and legal consequences for businesses. Businesses have paid billions of euros worth of fines for GDPR violations in 2023.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-role-of-an-mdm-in-the-data-ecosystem-of-an-organization\">The role of an MDM in the data ecosystem of an organization<\/h2>\n\n\n\n<p>Master Data Management (MDM) stands in the middle of a data ecosystem, orchestrating the harmonious flow of critical information essential for organizational success. Fundamentally, MDM serves as the authoritative source of truth, corralling and curating master data across disparate systems and silos. By unifying diverse datasets encompassing customers, products, suppliers, and more, MDM creates a single, holistic view of essential entities, free from the discrepancies and duplications that often plague decentralized data environments.<\/p>\n\n\n\n<p>Beyond mere consolidation, MDM empowers organizations with data governance capabilities, establishing clear policies, procedures, and controls to ensure the quality, integrity, and security of master data. Through robust governance frameworks, MDM delineates data ownership, stewardship responsibilities, and access controls, fostering accountability and transparency in data management practices.<\/p>\n\n\n\n<p>Therefore, it becomes extremely important to evaluate an MDM vendor not just for the breadth or capabilities of the solution but also for their commitment to the security of their customers\u2019 data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-syndigo-ensures-your-data-is-secure\">How Syndigo ensures your data is secure<\/h2>\n\n\n\n<p>At Syndigo we take the data concerns of our customers very seriously. Ensuring peace of mind for our customers regarding data protection is extremely important to the design and development teams at Syndigo. Here are a few of the many steps that are followed by Syndigo to protect our customers\u2019 data:<\/p>\n\n\n\n<p><strong>1. Privacy by Design and By Default<\/strong><\/p>\n\n\n\n<p>Syndigo\u2019s products adhere to the data minimization principle. Syndigo strives to limit the scope of personal data used, requested, and processed to a minimum. For example, when storing customer data, the solution is designed to only process its users\u2019 names, email addresses, job titles, and company information. Users can also be added using only their names or nicknames without surnames.<\/p>\n\n\n\n<p>Also, Syndigo\u2019s policy is to only keep personal data associated with a customer account in the system for twenty-one calendar days from the cancellation of the customer account. After that period, Syndigo deletes such data.<\/p>\n\n\n\n<p><strong>2. Encryption<\/strong><\/p>\n\n\n\n<p>Syndigo implements security measures to protect data, including personal data, during storage and in transit. Customer data is encrypted when in transit between our customer\u2019s software application and our services and so are the databases storing customer data at rest. We use cryptographic controls and approved algorithms are used for information protection within the systems. Cryptographic keys are managed throughout their lifecycle (e.g., ownership, generation, storage, distribution, periodic rotation, and revocation) per established key management procedures.<\/p>\n\n\n\n<p><strong>3. Disaster Recovery and Backups<\/strong><\/p>\n\n\n\n<p>Syndigo takes appropriate measures to counteract interruptions to business activities, to protect critical business processes from the effects of major failures of information systems or disasters, and to ensure their timely resumption. Syndigo has implemented and regularly updates a written disaster recovery and emergency mode operations plan to restore or recover any loss of data and systems necessary to make data available promptly.<\/p>\n\n\n\n<p><strong>4. User Identification and Authorization<\/strong><\/p>\n\n\n\n<p>Maintaining appropriate access control procedures is key to ensure authorized user access and to prevent theft or loss of personal data from information systems. Syndigo\u2019s policies establish the access control requirements for requesting and provisioning user access for accounts and services. The policies require that access be denied by default, following the least privilege principle and be granted only upon business need. Appropriate password hashing algorithms are in place to ensure that the authentication credential data stored is protected and unique to each customer.<\/p>\n\n\n\n<p><strong>5. Training<\/strong><\/p>\n\n\n\n<p>To continually strengthen data privacy and security, Syndigo invests heavily in ongoing training for all staff. Syndigo\u2019s training programs promote awareness of information security requirements and are completed by all personnel upon hire and monthly thereafter.<\/p>\n\n\n\n<p>Additionally, at least once a year, Syndigo employees and contingent staff with access to personal data must complete additional training on security best practices, and privacy principles.<\/p>\n\n\n\n<p>Click <a href=\"https:\/\/syndigo.com\/security-and-reliability\/\">here<\/a> for a comprehensive look at Syndigo\u2019s approach to ensuring security and reliability. <a href=\"https:\/\/syndigo.com\/request-demo\/\">Contact us<\/a> to learn more about how Syndigo MDM is the perfect solution for your needs in terms of managing your master data while fully ensuring its security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the digital age, where data is the new currency and connectivity is ubiquitous, the twin pillars of privacy and security stand as sentinel guardians of a competitive business landscape. When information flows freely and cyber threats lurk around every digital corner, businesses face a dual imperative: safeguarding the confidentiality of sensitive data while fortifying their defenses against potential breaches.<\/p>\n","protected":false},"author":2,"featured_media":59750,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","_page_status":"","footnotes":""},"categories":[16],"tags":[19],"class_list":["post-59748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-mdm"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.8 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Securing Your MDM: Safeguarding Data in the Digital Age<\/title>\n<meta name=\"description\" content=\"Explore how Syndigo ensures robust data security, offering peace of mind amid evolving privacy threats. Learn more about our privacy-centric approach today!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Your MDM: Safeguarding Data in the Digital Age\" \/>\n<meta property=\"og:description\" content=\"Explore how Syndigo ensures robust data security, offering peace of mind amid evolving privacy threats. Learn more about our privacy-centric approach today!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/syndigo.com\/fr\/blog\/securing-mdm-safeguarding-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Syndigo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/syndigoLLC\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-08T14:56:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-09T04:51:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syndigo.com\/wp-content\/uploads\/2024\/05\/Privacy-and-Security.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2148\" \/>\n\t<meta property=\"og:image:height\" content=\"1276\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Vignesh Sivaraj\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@syndigoLLC\" \/>\n<meta name=\"twitter:site\" content=\"@syndigoLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vignesh Sivaraj\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/blog\\\/securing-mdm-safeguarding-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/blog\\\/securing-mdm-safeguarding-data\\\/\"},\"author\":{\"name\":\"Vignesh Sivaraj\",\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/#\\\/schema\\\/person\\\/04b6f0b2b1d332163a4ea875c411ff85\"},\"headline\":\"Is Your MDM Ready to Endure The Privacy and Security Threats of the Future?\",\"datePublished\":\"2024-05-08T14:56:20+00:00\",\"dateModified\":\"2024-05-09T04:51:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/blog\\\/securing-mdm-safeguarding-data\\\/\"},\"wordCount\":1025,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/blog\\\/securing-mdm-safeguarding-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/syndigo.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Privacy-and-Security.webp\",\"keywords\":[\"MDM\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/blog\\\/securing-mdm-safeguarding-data\\\/\",\"url\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/blog\\\/securing-mdm-safeguarding-data\\\/\",\"name\":\"Securing Your MDM: Safeguarding Data in the Digital Age\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/blog\\\/securing-mdm-safeguarding-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/blog\\\/securing-mdm-safeguarding-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/syndigo.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Privacy-and-Security.webp\",\"datePublished\":\"2024-05-08T14:56:20+00:00\",\"dateModified\":\"2024-05-09T04:51:59+00:00\",\"description\":\"Explore how Syndigo ensures robust data security, offering peace of mind amid evolving privacy threats. Learn more about our privacy-centric approach today!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/blog\\\/securing-mdm-safeguarding-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/syndigo.com\\\/fr\\\/blog\\\/securing-mdm-safeguarding-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/blog\\\/securing-mdm-safeguarding-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/syndigo.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Privacy-and-Security.webp\",\"contentUrl\":\"https:\\\/\\\/syndigo.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Privacy-and-Security.webp\",\"width\":2148,\"height\":1276,\"caption\":\"Privacy and Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/blog\\\/securing-mdm-safeguarding-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/syndigo.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is Your MDM Ready to Endure The Privacy and Security Threats of the Future?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/\",\"name\":\"Syndigo\",\"description\":\"Data Unlocked. Potential Unleashed.\",\"publisher\":{\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/#organization\",\"name\":\"Syndigo\",\"url\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/syndigo.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Syndigo.png\",\"contentUrl\":\"https:\\\/\\\/syndigo.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Syndigo.png\",\"width\":696,\"height\":696,\"caption\":\"Syndigo\"},\"image\":{\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/syndigoLLC\",\"https:\\\/\\\/x.com\\\/syndigoLLC\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/syndigo\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC4W-3BtMfXVAwReREonADRg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/#\\\/schema\\\/person\\\/04b6f0b2b1d332163a4ea875c411ff85\",\"name\":\"Vignesh Sivaraj\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0a4932e023bb940b48ac9e06cbcf9f8f842e6bfabb17693c25f6968529c2043?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0a4932e023bb940b48ac9e06cbcf9f8f842e6bfabb17693c25f6968529c2043?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0a4932e023bb940b48ac9e06cbcf9f8f842e6bfabb17693c25f6968529c2043?s=96&d=mm&r=g\",\"caption\":\"Vignesh Sivaraj\"},\"url\":\"https:\\\/\\\/syndigo.com\\\/fr\\\/author\\\/vignesh\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing Your MDM: Safeguarding Data in the Digital Age","description":"Explore how Syndigo ensures robust data security, offering peace of mind amid evolving privacy threats. Learn more about our privacy-centric approach today!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Is Your MDM Ready to Endure The Privacy and Security Threats of the Future?","og_description":"Explore how Syndigo ensures robust data security, offering peace of mind amid evolving privacy threats. Learn more about our privacy-centric approach today!","og_url":"https:\/\/syndigo.com\/fr\/blog\/securing-mdm-safeguarding-data\/","og_site_name":"Syndigo","article_publisher":"https:\/\/www.facebook.com\/syndigoLLC","article_published_time":"2024-05-08T14:56:20+00:00","article_modified_time":"2024-05-09T04:51:59+00:00","og_image":[{"width":2148,"height":1276,"url":"https:\/\/syndigo.com\/wp-content\/uploads\/2024\/05\/Privacy-and-Security.webp","type":"image\/webp"}],"author":"Vignesh Sivaraj","twitter_card":"summary_large_image","twitter_creator":"@syndigoLLC","twitter_site":"@syndigoLLC","twitter_misc":{"Written by":"Vignesh Sivaraj","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/syndigo.com\/fr\/blog\/securing-mdm-safeguarding-data\/#article","isPartOf":{"@id":"https:\/\/syndigo.com\/fr\/blog\/securing-mdm-safeguarding-data\/"},"author":{"name":"Vignesh Sivaraj","@id":"https:\/\/syndigo.com\/fr\/#\/schema\/person\/04b6f0b2b1d332163a4ea875c411ff85"},"headline":"Is Your MDM Ready to Endure The Privacy and Security Threats of the Future?","datePublished":"2024-05-08T14:56:20+00:00","dateModified":"2024-05-09T04:51:59+00:00","mainEntityOfPage":{"@id":"https:\/\/syndigo.com\/fr\/blog\/securing-mdm-safeguarding-data\/"},"wordCount":1025,"commentCount":0,"publisher":{"@id":"https:\/\/syndigo.com\/fr\/#organization"},"image":{"@id":"https:\/\/syndigo.com\/fr\/blog\/securing-mdm-safeguarding-data\/#primaryimage"},"thumbnailUrl":"https:\/\/syndigo.com\/wp-content\/uploads\/2024\/05\/Privacy-and-Security.webp","keywords":["MDM"],"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/syndigo.com\/fr\/blog\/securing-mdm-safeguarding-data\/","url":"https:\/\/syndigo.com\/fr\/blog\/securing-mdm-safeguarding-data\/","name":"Securing Your MDM: Safeguarding Data in the Digital Age","isPartOf":{"@id":"https:\/\/syndigo.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/syndigo.com\/fr\/blog\/securing-mdm-safeguarding-data\/#primaryimage"},"image":{"@id":"https:\/\/syndigo.com\/fr\/blog\/securing-mdm-safeguarding-data\/#primaryimage"},"thumbnailUrl":"https:\/\/syndigo.com\/wp-content\/uploads\/2024\/05\/Privacy-and-Security.webp","datePublished":"2024-05-08T14:56:20+00:00","dateModified":"2024-05-09T04:51:59+00:00","description":"Explore how Syndigo ensures robust data security, offering peace of mind amid evolving privacy threats. Learn more about our privacy-centric approach today!","breadcrumb":{"@id":"https:\/\/syndigo.com\/fr\/blog\/securing-mdm-safeguarding-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/syndigo.com\/fr\/blog\/securing-mdm-safeguarding-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/syndigo.com\/fr\/blog\/securing-mdm-safeguarding-data\/#primaryimage","url":"https:\/\/syndigo.com\/wp-content\/uploads\/2024\/05\/Privacy-and-Security.webp","contentUrl":"https:\/\/syndigo.com\/wp-content\/uploads\/2024\/05\/Privacy-and-Security.webp","width":2148,"height":1276,"caption":"Privacy and Security"},{"@type":"BreadcrumbList","@id":"https:\/\/syndigo.com\/fr\/blog\/securing-mdm-safeguarding-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/syndigo.com\/"},{"@type":"ListItem","position":2,"name":"Is Your MDM Ready to Endure The Privacy and Security Threats of the Future?"}]},{"@type":"WebSite","@id":"https:\/\/syndigo.com\/fr\/#website","url":"https:\/\/syndigo.com\/fr\/","name":"Syndigo","description":"Data Unlocked. Potential Unleashed.","publisher":{"@id":"https:\/\/syndigo.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/syndigo.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/syndigo.com\/fr\/#organization","name":"Syndigo","url":"https:\/\/syndigo.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/syndigo.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/syndigo.com\/wp-content\/uploads\/2024\/01\/Syndigo.png","contentUrl":"https:\/\/syndigo.com\/wp-content\/uploads\/2024\/01\/Syndigo.png","width":696,"height":696,"caption":"Syndigo"},"image":{"@id":"https:\/\/syndigo.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/syndigoLLC","https:\/\/x.com\/syndigoLLC","https:\/\/www.linkedin.com\/company\/syndigo","https:\/\/www.youtube.com\/channel\/UC4W-3BtMfXVAwReREonADRg"]},{"@type":"Person","@id":"https:\/\/syndigo.com\/fr\/#\/schema\/person\/04b6f0b2b1d332163a4ea875c411ff85","name":"Vignesh Sivaraj","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d0a4932e023bb940b48ac9e06cbcf9f8f842e6bfabb17693c25f6968529c2043?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d0a4932e023bb940b48ac9e06cbcf9f8f842e6bfabb17693c25f6968529c2043?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d0a4932e023bb940b48ac9e06cbcf9f8f842e6bfabb17693c25f6968529c2043?s=96&d=mm&r=g","caption":"Vignesh Sivaraj"},"url":"https:\/\/syndigo.com\/fr\/author\/vignesh\/"}]}},"author_meta":{"display_name":"Vignesh Sivaraj","author_link":"https:\/\/syndigo.com\/fr\/author\/vignesh\/"},"featured_img":"https:\/\/syndigo.com\/wp-content\/uploads\/2024\/05\/Privacy-and-Security-300x178.webp","coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/syndigo.com\/fr\/category\/blog\/\" class=\"advgb-post-tax-term\">Blog<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Blog<\/span>"]},"tags":{"linked":["<a href=\"https:\/\/syndigo.com\/fr\/category\/blog\/\" class=\"advgb-post-tax-term\">MDM<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">MDM<\/span>"]}},"comment_count":0,"relative_dates":{"created":"Posted 2 years ago","modified":"Updated 2 years ago"},"absolute_dates":{"created":"Posted on May 8, 2024","modified":"Updated on May 9, 2024"},"absolute_dates_time":{"created":"Posted on May 8, 2024 2:56 pm","modified":"Updated on May 9, 2024 4:51 am"},"featured_img_caption":"","series_order":"","_links":{"self":[{"href":"https:\/\/syndigo.com\/fr\/wp-json\/wp\/v2\/posts\/59748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/syndigo.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/syndigo.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/syndigo.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/syndigo.com\/fr\/wp-json\/wp\/v2\/comments?post=59748"}],"version-history":[{"count":0,"href":"https:\/\/syndigo.com\/fr\/wp-json\/wp\/v2\/posts\/59748\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/syndigo.com\/fr\/wp-json\/wp\/v2\/media\/59750"}],"wp:attachment":[{"href":"https:\/\/syndigo.com\/fr\/wp-json\/wp\/v2\/media?parent=59748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/syndigo.com\/fr\/wp-json\/wp\/v2\/categories?post=59748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/syndigo.com\/fr\/wp-json\/wp\/v2\/tags?post=59748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}