{"id":8061,"date":"2026-05-18T11:30:07","date_gmt":"2026-05-18T11:30:07","guid":{"rendered":"https:\/\/locaterisk.com\/?p=8061"},"modified":"2026-05-18T11:57:56","modified_gmt":"2026-05-18T11:57:56","slug":"schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/en\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/","title":{"rendered":"Eliminate shadow IT with LocateRisk MCP &amp; AI | EASM"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Back to Blog                <a href=\"https:\/\/locaterisk.com\/en\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\"><strong>AI-supported EASM: Eliminate shadow IT with the LocateRisk MCP interface<\/strong><\/h1>\r\n            <p class=\"paragraph\"><br><strong>AI-supported EASM<\/strong><br>The identification of unknown infrastructure is a core task in External Attack Surface Management (EASM). LocateRisk provides a specialized interface for this based on the <strong>Model Context Protocol (MCP)<\/strong> ready. LocateRisk is currently the only provider to enable direct machine-to-machine communication, which makes complex discovery paths of IT systems immediately analyzable for artificial intelligence.<br><strong><em><br><\/em>Seamlessly connect your own AI models - MCP makes LocateRisk part of your infrastructure<\/strong><br>With the <strong>LocateRisk MCP interface<\/strong> bind your <strong>Own AI model<\/strong> (e.g. internal ChatGPT, Claude or local open source models) directly to our system. You don't have to program any complex interfaces - your AI \u201eunderstands\u201c our data natively through the MCP. This means you retain full control over your analysis logic and use your familiar environment for automated security reports.<br><\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-S.png\" alt=\"LocateRisk MCP Case Study 4 Shadow IT S\" class=\"wp-image-8242\" style=\"object-fit:cover;width:825px;height:auto\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-S.png 1000w, https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-S-300x200.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-S-768x512.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-S-18x12.png 18w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\">LocateRisk provides up-to-date data on your IT attack surface, and the MCP interface makes it directly usable - for automated assessment and protection in seconds.<\/figcaption><\/figure><\/div>\n\n\n<p>The following case study shows how this technology helps to uncover hidden systems (Shadow IT).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Case Study: <strong>Uncovering shadow IT with discovery paths<\/strong><\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Initial situation<\/strong><\/h3>\n\n\n\n<p>The IP address 49.12.87.60 appears in a recent security report. The IT manager cannot assign this host to any known department. He needs to clarify: How was this server discovered? Does it actually belong to the organization? Who bears operational responsibility?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Solution with the LocateRisk MCP interface<\/strong><\/h3>\n\n\n\n<p>The IT specialist uses the MCP connection to examine the entire external attack surface via its familiar AI interface. The advantage: the return values of the interface are so compact that the AI can process the entire context of the network connections without any loss of data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 1: <strong>Infrastructure overview<\/strong><\/strong><\/h3>\n\n\n\n<p>First, the scope of the infrastructure is queried via the interface. The current scan provides the following metrics:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Subdomains:<\/strong> 44<\/li>\n\n\n\n<li><strong>IP addresses:<\/strong> 24<\/li>\n\n\n\n<li><strong>Network node:<\/strong> 183<\/li>\n\n\n\n<li><strong>Network connections:<\/strong> 415<\/li>\n<\/ul>\n\n\n\n<p>The discovered subdomains include, among others:<br>app.locaterisk.com, preview.locaterisk.com, n8n.locaterisk.com, zulip.locaterisk.com, snake.locaterisk.com, konzern.locaterisk.com, desk.locaterisk.com, cal.locaterisk.com, backend.locaterisk.com, testing.locaterisk.com, ct.locaterisk.com and app-staging.locaterisk.com.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 2: <strong>Tracing the discovery path<\/strong><\/strong><\/h3>\n\n\n\n<p>To clarify the origin of the unknown IP, the IT manager issues a direct command to his AI:<\/p>\n\n\n\n<p><strong>\u201eHow was 49.12.87.60 discovered?\u201c<\/strong><\/p>\n\n\n\n<p>The MCP interface provides two unique discovery paths:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Path 1:<\/strong> Via the reverse DNS entry of the provider (static.60.87.12.49.clients.your-server.de).<\/li>\n\n\n\n<li><strong>Path 2:<\/strong> Via the subdomain preview.locaterisk.com, which points directly to this IP via a DNS entry.<\/li>\n<\/ul>\n\n\n\n<p>This proves it: The host belongs to the organization, as its own subdomain actively points to this address.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 3: <strong><strong>Network context for suspicious services<\/strong><\/strong><\/strong><\/h3>\n\n\n\n<p>The IT specialist would now like to know what is behind other unknown subdomains:<\/p>\n\n\n\n<p><strong><strong>\u201eShow the network graph for zulip.locaterisk.com.\u201c<\/strong><\/strong><\/p>\n\n\n\n<p>The analysis shows: locaterisk.com is linked to zulip.locaterisk.com via the CRT_MEMBER (SSL certificate) and SUBDOMAIN (DNS enumeration) findings. The host operates an instance of the open source chat app \u201eZulip\u201c.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Result: <strong>Clarity about identified systems in seconds<\/strong><\/strong><\/h3>\n\n\n\n<p>By transparently displaying the detection paths, the IT manager can clean up the entire attack surface:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Identify shadow IT:<\/strong> Services such as n8n, Zulip and Snake were recognized as exposed services.<\/li>\n\n\n\n<li><strong>Find staging environments:<\/strong> Three systems (testing, preview, app staging) should not be public<\/li>\n\n\n\n<li><strong>Clarify responsibilities:<\/strong> Each host has a traceable path from the root domain.<\/li>\n\n\n\n<li><strong>Clean up scope:<\/strong> Hosts that do not belong can be removed directly from the scan.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Findings<\/strong><\/h3>\n\n\n\n<p>The evaluation of the 44 subdomains provides the following recommendations for action:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Production systems (5 found): These include app, www and backend. No change is required here.<\/li>\n\n\n\n<li>Internal services (4 found): These include n8n, zulip, cal and desk. Action: Check access protection.<\/li>\n\n\n\n<li>Staging\/test (3 found): This includes testing, preview and app staging. Action: Restrict public access.<\/li>\n\n\n\n<li>Other systems (3 found): These include snake, konzern and ct. Action: Identify the person responsible.<\/li>\n<\/ul>\n\n\n\n<p><strong>Time saving<\/strong><br>Without the MCP interface, log files, DNS entries and SSL certificates would have to be synchronized manually in order to reconstruct these paths. This process usually takes several hours. The LocateRisk MCP interface provides the answer in <strong>less than 10 seconds<\/strong> before.<\/p>\n\n\n\n<p><strong>Compliance and digital sovereignty<\/strong><br>The seamless traceability of the infrastructure is a basic prerequisite for the <strong>NIS-2 conformity<\/strong> and the <strong>IT baseline protection<\/strong>. LocateRisk operates its analysis platform in certified data centers in <strong>Germany and the EU<\/strong>. This guarantees that sensitive information about your attack surface is processed in compliance with the GDPR and remains protected from access by the US Cloud Act.<\/p>\n\n\n\n<div class=\"wp-block-lr-faq-module\"><div class=\"content\"><h3><strong>Technical FAQ: <strong>Infrastructure Discovery<\/strong><\/strong><\/h3><div class=\"faq-topic\"><hr\/><div class=\"collapsible-title\"><a class=\"pr-4\"><strong><strong>Can I use the LocateRisk MCP with locally hosted AI models?<\/strong><\/strong><\/a><img class=\"collapse-toggle\" srcset=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@3x.png 3x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@2x.png 2x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus.png 1x\"\/><\/div><div class=\"collapsible-content\"><p class=\"font-normal\">A major advantage of the MCP interface is the <strong>Sovereignty in the choice of model<\/strong>. Companies can connect their own AI infrastructure - such as locally hosted instances of Llama 3 or private instances of ChatGPT - directly. Since data processing at LocateRisk takes place in certified data centers in <strong>Germany and the EU<\/strong> the entire chain remains GDPR-compliant and protected from the US Cloud Act.<\/p><\/div><\/div><div class=\"faq-topic\"><hr\/><div class=\"collapsible-title\"><a class=\"pr-4\"><strong><strong>How does an AI automatically detect configuration drifts via the MCP interface?<\/strong><\/strong><\/a><img class=\"collapse-toggle\" srcset=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@3x.png 3x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@2x.png 2x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus.png 1x\"\/><\/div><div class=\"collapsible-content\"><p class=\"font-normal\">With access to the complete history of over 60 scans, an AI can use MCP to make a precise <strong>Delta analysis<\/strong> perform. It immediately identifies deviations in the target status, such as new open ports, changed SSL ciphers or unknown subdomains. Instead of sifting through hundreds of findings, the analyst receives a prioritized report on the specific change and its risk impact.<\/p><\/div><\/div><div class=\"faq-topic\"><hr\/><div class=\"collapsible-title\"><a class=\"pr-4\"><strong><strong>Is the LocateRisk architecture compliant with the EU AI Act?<\/strong><\/strong><\/a><img class=\"collapse-toggle\" srcset=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@3x.png 3x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@2x.png 2x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus.png 1x\"\/><\/div><div class=\"collapsible-content\"><p class=\"font-normal\">Since LocateRisk provides the MCP interface as a technical enabler and the control over the selected AI model lies with the customer, this setup supports a <strong>Transparent and responsible use of AI<\/strong>. The transmitted data payloads are of a purely technical nature. This facilitates compliance with European AI regulations, as no black box decisions are enforced and the analysis logic remains within the user's sphere of control.<\/p><\/div><\/div><div class=\"faq-topic\"><hr\/><div class=\"collapsible-title\"><a class=\"pr-4\"><strong><strong>How does the MCP connection accelerate the onboarding of suppliers in VRM?<\/strong><\/strong><\/a><img class=\"collapse-toggle\" srcset=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@3x.png 3x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@2x.png 2x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus.png 1x\"\/><\/div><div class=\"collapsible-content\"><p class=\"font-normal\">The interface allows technical scan results to be compared directly with the <strong>639 available questionnaire templates<\/strong> (e.g. for TISAX or ISO 27001). An AI can immediately compare the technical facts with the suppliers' self-declarations. This shortens the process from selective checks to continuous monitoring of the cyber supply chain (CSCRM) and saves weeks of correspondence time.<\/p><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2><br>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">I agree with the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_self\">privacy policy<\/a>.<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Request a Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>The identification of unknown infrastructure is a core task in External Attack Surface Management (EASM). LocateRisk provides a specialized interface based on the Model Context Protocol (MCP) for this purpose. LocateRisk is currently the only provider to enable direct machine-to-machine communication, which makes complex detection paths of IT systems immediately analyzable for artificial intelligence.<\/p>","protected":false},"author":17,"featured_media":8245,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[95,94,92,97,98,91,4,8,88,93,89,90,37,96,99],"class_list":["post-8061","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-automatisierter-scan-vergleich-it-sicherheit","tag-cyber-vendor-risk-management","tag-easm","tag-easm-tool-mit-mcp-support","tag-effizienzsteigerung-it-security-analyst","tag-external-attack-surface-management","tag-it-sicherheit","tag-it-sicherheitsanalysen","tag-ki-native-sicherheitsanalyse","tag-locaterisk","tag-mcp-schnittstelle","tag-model-context-protocol","tag-nis2","tag-sicherheits-reporting-automatisieren-ki","tag-supply-chain-risk-management-nis-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM - LocateRisk<\/title>\n<meta name=\"description\" content=\"Verbinden Sie Ihre KI per MCP mit LocateRisk und identifizieren Sie Schatten-IT, Staging-Systeme und unbekannte Hosts in unter 10 Sekunden \u2013 DSGVO-konform aus der EU.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Verbinden Sie Ihre KI per MCP mit LocateRisk und identifizieren Sie Schatten-IT, Staging-Systeme und unbekannte Hosts in unter 10 Sekunden \u2013 DSGVO-konform aus der EU.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-18T11:30:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-18T11:57:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Shaima Luc\u00eda El Qaouti\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shaima Luc\u00eda El Qaouti\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/\"},\"author\":{\"name\":\"Shaima Luc\u00eda El Qaouti\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/db0ff14304cd2bcafbc27d3c7d470cc7\"},\"headline\":\"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM\",\"datePublished\":\"2026-05-18T11:30:07+00:00\",\"dateModified\":\"2026-05-18T11:57:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/\"},\"wordCount\":1071,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png\",\"keywords\":[\"Automatisierter Scan-Vergleich IT-Sicherheit\",\"Cyber Vendor Risk Management\",\"EASM\",\"EASM Tool mit MCP-Support\",\"Effizienzsteigerung IT-Security-Analyst\",\"External Attack Surface Management\",\"IT-Sicherheit\",\"IT-Sicherheitsanalysen\",\"KI-native Sicherheitsanalyse\",\"LocateRisk\",\"MCP-Schnittstelle\",\"Model Context Protocol\",\"NIS2\",\"Sicherheits-Reporting automatisieren KI\",\"Supply Chain Risk Management NIS-2\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/\",\"name\":\"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png\",\"datePublished\":\"2026-05-18T11:30:07+00:00\",\"dateModified\":\"2026-05-18T11:57:56+00:00\",\"description\":\"Verbinden Sie Ihre KI per MCP mit LocateRisk und identifizieren Sie Schatten-IT, Staging-Systeme und unbekannte Hosts in unter 10 Sekunden \u2013 DSGVO-konform aus der EU.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png\",\"width\":600,\"height\":600,\"caption\":\"LocateRisk MCP Case Study 4 Shadow IT Teaser\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/db0ff14304cd2bcafbc27d3c7d470cc7\",\"name\":\"Shaima Luc\u00eda El Qaouti\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g\",\"caption\":\"Shaima Luc\u00eda El Qaouti\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM - LocateRisk","description":"Verbinden Sie Ihre KI per MCP mit LocateRisk und identifizieren Sie Schatten-IT, Staging-Systeme und unbekannte Hosts in unter 10 Sekunden \u2013 DSGVO-konform aus der EU.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/","og_locale":"en_US","og_type":"article","og_title":"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM - LocateRisk","og_description":"Verbinden Sie Ihre KI per MCP mit LocateRisk und identifizieren Sie Schatten-IT, Staging-Systeme und unbekannte Hosts in unter 10 Sekunden \u2013 DSGVO-konform aus der EU.","og_url":"https:\/\/locaterisk.com\/en\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/","og_site_name":"LocateRisk","article_published_time":"2026-05-18T11:30:07+00:00","article_modified_time":"2026-05-18T11:57:56+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png","type":"image\/png"}],"author":"Shaima Luc\u00eda El Qaouti","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Shaima Luc\u00eda El Qaouti","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/"},"author":{"name":"Shaima Luc\u00eda El Qaouti","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/db0ff14304cd2bcafbc27d3c7d470cc7"},"headline":"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM","datePublished":"2026-05-18T11:30:07+00:00","dateModified":"2026-05-18T11:57:56+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/"},"wordCount":1071,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png","keywords":["Automatisierter Scan-Vergleich IT-Sicherheit","Cyber Vendor Risk Management","EASM","EASM Tool mit MCP-Support","Effizienzsteigerung IT-Security-Analyst","External Attack Surface Management","IT-Sicherheit","IT-Sicherheitsanalysen","KI-native Sicherheitsanalyse","LocateRisk","MCP-Schnittstelle","Model Context Protocol","NIS2","Sicherheits-Reporting automatisieren KI","Supply Chain Risk Management NIS-2"],"articleSection":["Blog post"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/","url":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/","name":"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png","datePublished":"2026-05-18T11:30:07+00:00","dateModified":"2026-05-18T11:57:56+00:00","description":"Verbinden Sie Ihre KI per MCP mit LocateRisk und identifizieren Sie Schatten-IT, Staging-Systeme und unbekannte Hosts in unter 10 Sekunden \u2013 DSGVO-konform aus der EU.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png","width":600,"height":600,"caption":"LocateRisk MCP Case Study 4 Shadow IT Teaser"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/db0ff14304cd2bcafbc27d3c7d470cc7","name":"Shaima Luc\u00eda El Qaouti","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g","caption":"Shaima Luc\u00eda El Qaouti"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/8061","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=8061"}],"version-history":[{"count":8,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/8061\/revisions"}],"predecessor-version":[{"id":8251,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/8061\/revisions\/8251"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media\/8245"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=8061"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/categories?post=8061"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/tags?post=8061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}