{"id":663,"date":"2020-10-22T13:20:51","date_gmt":"2020-10-22T13:20:51","guid":{"rendered":"https:\/\/webdev.locaterisk.com\/?post_type=landing&#038;p=663"},"modified":"2025-02-11T10:44:06","modified_gmt":"2025-02-11T10:44:06","slug":"konzernreporting","status":"publish","type":"landing","link":"https:\/\/locaterisk.com\/en\/landing\/konzernreporting\/","title":{"rendered":"Enterprise Cyber Risk Management"},"content":{"rendered":"<div class=\"wp-block-lr-landing-header-container\"><div class=\"content\"><div class=\"upload-image\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/Triangleredtransp-gradient.png\"\/><\/div><div class=\"content-container\"><p class=\"pre-headline\">IT security assessments for large organizations<\/p><h1 class=\"headline\">Enterprise Cyber Risk Management<\/h1><p class=\"subline\">LocateRisk enables fully automated IT risk analyses for regular cyber security reports to the board of directors. Large companies, business groups, corporations and associations achieve decisive added value by determining the security of the IT systems of investments, suppliers and market participants in a comparable risk analysis.<\/p><a id=\"landing-button-ghost\" class=\"pr-2\"><\/a><a id=\"landing-button\" class=\"pr-2\" target=\"\" href=\"#lr-contact-form\" rel=\"noopener\">Request a Demo<\/a><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-lr-container-configurable undefined dark\"><div class=\"content\"><div class=\"parallax-wrapper\"><div class=\"triangle-container right\" data-parallax=\"0.2\"><img decoding=\"async\" class=\"right dark\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/dark-blue-triangle-single.png\"\/><\/div><\/div><div class=\"container\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-lr-image-text-module undefined dark right\"><div class=\"content\"><div class=\"column-2 pad-right-128\"><h3><\/h3><h4><\/h4><p>In order to provide the company management with an overview of the IT security situation of all investments, LocateRisk offers a non-invasive risk analysis with comparable performance indicators. The scanned data of the risk analysis provides information about externally visible network and application security, encryption and configurations.\u00a0<br><br>The IT security situation is presented clearly and compactly via the LocateRisk platform and offers the possibility to quickly provide the management level with recommendations for action. For this purpose, it is also possible to cluster the investments into categories in order to subsequently integrate the data via an export function into company-internal BI tools. In addition to the own investments, competitors can also be scanned anonymously and compared with the own IT situation.<br><\/p><a class=\"pr-4\" target=\"\" rel=\"noopener\"><\/a><\/div><div class=\"column-2\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Cubes_Generisch_01.jpg\" class=\"image\"\/><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-lr-image-text-module undefined dark left\"><div class=\"content\"><div class=\"column-2\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/201028_Puzzle-Pfeile959x950_V01.jpg\" class=\"image\"\/><\/div><div class=\"column-2 pad-left-128\"><h3>Advantages at All Levels<\/h3><h4><\/h4><p><strong>Effective communication<br><\/strong>The LocateRisk risk analysis shows management boards and supervisory boards the significance of IT security and cyber risks in a comprehensible and accessible manner using key figure-based metrics.\u00a0<br><br><strong>Fast decision making<\/strong><br>As cyber incidents have an increasing impact on business results, management needs a thorough understanding of the IT security situation to make the right decisions.<br><br><strong>Automated reporting<\/strong><br>Reduce the time required to manually capture metrics and data. Use automated and comparable risk analyses to show the cyber risk of your investments.<br><br><strong>Strengthen awareness<\/strong><br>Demonstrate how your IT security situation compares to industry peers and competitors. Compare the security situation of up to 10 companies quickly and efficiently.<br><br><strong>Scalable Transparency<\/strong><br>LocateRisk analyzes DAX corporations - the risk analysis of a large number of investments is no challenge.<\/p><a class=\"pr-4\" target=\"\" rel=\"noopener noreferrer\"><\/a><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Monitor and minimize your external IT attack surface<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Schedule a demo and see how well your organization-wide IT attack surface is protected.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"feature-containers\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"feature-container\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"icon-container\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/contact-post-module\/img\/check@3x.png\"\/>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"feature-text\">\n\t\t\t\t\t\t\t\t\t\t\t<p class=\"feature-title\">Overview of the externally accessible system landscape (incl. shadow IT).<\/p>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"feature-container\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"icon-container\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/contact-post-module\/img\/check@3x.png\"\/>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"feature-text\">\n\t\t\t\t\t\t\t\t\t\t\t<p class=\"feature-title\">Assessment of the IT security situation, classified according to 8 categories and prioritized according to criticality.<\/p>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"feature-container\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"icon-container\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/contact-post-module\/img\/check@3x.png\"\/>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"feature-text\">\n\t\t\t\t\t\t\t\t\t\t\t<p class=\"feature-title\">Functions and recommended actions for quick optimization.<\/p>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"konzernreporting\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">I agree with the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_self\">privacy policy<\/a>.<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\">Schedule a Live Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"author":6,"template":"","class_list":["post-663","landing","type-landing","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Konzernreporting - LocateRisk<\/title>\n<meta name=\"description\" content=\"Pr\u00fcfen Sie die IT-Sicherheit Ihrer Beteiligungen mit KPI-basierten IT-Sicherheitsanalysen. Generieren Sie Management- und IT-Berichte f\u00fcr das Konzernreporting.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/landing\/konzernreporting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Konzernreporting - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Pr\u00fcfen Sie die IT-Sicherheit Ihrer Beteiligungen mit KPI-basierten IT-Sicherheitsanalysen. Generieren Sie Management- und IT-Berichte f\u00fcr das Konzernreporting.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/landing\/konzernreporting\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-11T10:44:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/Triangleredtransp-gradient.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/landing\\\/konzernreporting\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/landing\\\/konzernreporting\\\/\",\"name\":\"Konzernreporting - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/landing\\\/konzernreporting\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/landing\\\/konzernreporting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Triangleredtransp-gradient.png\",\"datePublished\":\"2020-10-22T13:20:51+00:00\",\"dateModified\":\"2025-02-11T10:44:06+00:00\",\"description\":\"Pr\u00fcfen Sie die IT-Sicherheit Ihrer Beteiligungen mit KPI-basierten IT-Sicherheitsanalysen. Generieren Sie Management- und IT-Berichte f\u00fcr das Konzernreporting.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/landing\\\/konzernreporting\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/landing\\\/konzernreporting\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/landing\\\/konzernreporting\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Triangleredtransp-gradient.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Triangleredtransp-gradient.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/landing\\\/konzernreporting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Konzernreporting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Group reporting - LocateRisk","description":"Check the IT security of your investments with KPI-based IT security analyses. Generate management and IT reports for Group reporting.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/landing\/konzernreporting\/","og_locale":"en_US","og_type":"article","og_title":"Konzernreporting - LocateRisk","og_description":"Pr\u00fcfen Sie die IT-Sicherheit Ihrer Beteiligungen mit KPI-basierten IT-Sicherheitsanalysen. Generieren Sie Management- und IT-Berichte f\u00fcr das Konzernreporting.","og_url":"https:\/\/locaterisk.com\/en\/landing\/konzernreporting\/","og_site_name":"LocateRisk","article_modified_time":"2025-02-11T10:44:06+00:00","og_image":[{"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/Triangleredtransp-gradient.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/landing\/konzernreporting\/","url":"https:\/\/locaterisk.com\/landing\/konzernreporting\/","name":"Group reporting - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/landing\/konzernreporting\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/landing\/konzernreporting\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/Triangleredtransp-gradient.png","datePublished":"2020-10-22T13:20:51+00:00","dateModified":"2025-02-11T10:44:06+00:00","description":"Check the IT security of your investments with KPI-based IT security analyses. Generate management and IT reports for Group reporting.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/landing\/konzernreporting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/landing\/konzernreporting\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/landing\/konzernreporting\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/Triangleredtransp-gradient.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/Triangleredtransp-gradient.png"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/landing\/konzernreporting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Konzernreporting"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/landing\/663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/landing"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/landing"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/6"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}