{"id":8061,"date":"2026-05-18T11:30:07","date_gmt":"2026-05-18T11:30:07","guid":{"rendered":"https:\/\/locaterisk.com\/?p=8061"},"modified":"2026-05-18T11:57:56","modified_gmt":"2026-05-18T11:57:56","slug":"schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/fr\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/","title":{"rendered":"\u00c9liminer le Shadow IT avec LocateRisk MCP &amp; IA | EASM"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Retour au blog                <a href=\"https:\/\/locaterisk.com\/fr\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\"><strong>EASM bas\u00e9 sur l'IA : \u00e9liminer le Shadow IT avec l'interface MCP de LocateRisk<\/strong><\/h1>\r\n            <p class=\"paragraph\"><br><strong>EASM assist\u00e9 par IA<\/strong><br>L'identification de l'infrastructure inconnue est une t\u00e2che essentielle dans la gestion des surfaces d'attaque externes (EASM). LocateRisk fournit pour cela une interface sp\u00e9cialis\u00e9e bas\u00e9e sur le <strong>Protocole de contexte de mod\u00e8le (MCP)<\/strong> est disponible. LocateRisk est actuellement le seul fournisseur \u00e0 permettre une communication directe de machine \u00e0 machine qui rend les chemins de d\u00e9couverte complexes des syst\u00e8mes informatiques imm\u00e9diatement exploitables par l'intelligence artificielle.<br><strong><em><br><\/em>Connecter vos propres mod\u00e8les d'IA de mani\u00e8re transparente - MCP fait de LocateRisk une partie de votre infrastructure<\/strong><br>Avec la <strong>Interface MCP LocateRisk<\/strong> liez votre <strong>propre mod\u00e8le d'IA<\/strong> (par ex. ChatGPT interne, Claude ou des mod\u00e8les open source locaux) directement \u00e0 notre syst\u00e8me. Vous n'avez pas besoin de programmer des interfaces complexes - votre IA \u201ecomprend\u201c nos donn\u00e9es de mani\u00e8re native gr\u00e2ce au MCP. Vous gardez ainsi le contr\u00f4le total de votre logique d'analyse et utilisez votre environnement habituel pour des rapports de s\u00e9curit\u00e9 automatis\u00e9s.<br><\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-S.png\" alt=\"LocateRisk MCP Case Study 4 Shadow IT S\" class=\"wp-image-8242\" style=\"object-fit:cover;width:825px;height:auto\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-S.png 1000w, https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-S-300x200.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-S-768x512.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-S-18x12.png 18w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\">LocateRisk fournit des donn\u00e9es actualis\u00e9es sur votre surface d'attaque informatique, l'interface MCP les rend directement utilisables - pour une \u00e9valuation et une protection automatis\u00e9es en quelques secondes.<\/figcaption><\/figure><\/div>\n\n\n<p>L'\u00e9tude de cas suivante montre comment cette technologie aide \u00e0 d\u00e9couvrir les syst\u00e8mes cach\u00e9s (Shadow IT).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u00c9tude de cas : <strong>D\u00e9couvrir le Shadow IT avec des pistes de d\u00e9couverte<\/strong><\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Situation de d\u00e9part<\/strong><\/h3>\n\n\n\n<p>Dans un r\u00e9cent rapport de s\u00e9curit\u00e9, l'adresse IP 49.12.87.60 appara\u00eet. Le responsable informatique ne peut pas attribuer cet h\u00f4te \u00e0 un service connu. Il doit clarifier la situation : Comment ce serveur a-t-il \u00e9t\u00e9 d\u00e9couvert ? Fait-il r\u00e9ellement partie de l'organisation ? Qui en assume la responsabilit\u00e9 op\u00e9rationnelle ?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Solution avec l'interface MCP de LocateRisk<\/strong><\/h3>\n\n\n\n<p>L'informaticien utilise la connexion MCP pour examiner l'ensemble de la surface d'attaque externe via son interface IA habituelle. L'avantage : les valeurs de retour de l'interface sont si compactes que l'IA peut traiter l'ensemble du contexte des connexions r\u00e9seau sans perte de donn\u00e9es.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>\u00c9tape 1 : <strong>Aper\u00e7u de l'infrastructure<\/strong><\/strong><\/h3>\n\n\n\n<p>Tout d'abord, l'\u00e9tendue de l'infrastructure est interrog\u00e9e via l'interface. L'analyse actuelle fournit les m\u00e9triques suivantes :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Sous-domaines :<\/strong> 44<\/li>\n\n\n\n<li><strong>les adresses IP :<\/strong> 24<\/li>\n\n\n\n<li><strong>N\u0153ud de r\u00e9seau :<\/strong> 183<\/li>\n\n\n\n<li><strong>Connexions r\u00e9seau :<\/strong> 415<\/li>\n<\/ul>\n\n\n\n<p>Parmi les sous-domaines d\u00e9couverts, on trouve notamment<br>app.locaterisk.com, preview.locaterisk.com, n8n.locaterisk.com, zulip.locaterisk.com, snake.locaterisk.com, konzern.locaterisk.com, desk.locaterisk.com, cal.locaterisk.com, backend.locaterisk.com, testing.locaterisk.com, ct.locaterisk.com et app-staging.locaterisk.com.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>\u00c9tape 2 : <strong>Suivre le chemin de d\u00e9couverte<\/strong><\/strong><\/h3>\n\n\n\n<p>Pour clarifier l'origine de l'IP inconnue, le responsable informatique donne un ordre direct \u00e0 son IA :<\/p>\n\n\n\n<p><strong>\u201eComment a-t-on d\u00e9couvert 49.12.87.60 ?\u201c<\/strong><\/p>\n\n\n\n<p>L'interface MCP fournit deux chemins de d\u00e9couverte uniques :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Chemin 1 :<\/strong> Via l'enregistrement DNS invers\u00e9 du fournisseur (static.60.87.12.49.clients.your-server.de).<\/li>\n\n\n\n<li><strong>Chemin 2 :<\/strong> Via le sous-domaine preview.locaterisk.com, qui renvoie directement \u00e0 cette IP par enregistrement DNS.<\/li>\n<\/ul>\n\n\n\n<p>Il est ainsi attest\u00e9 : L'h\u00f4te appartient \u00e0 l'organisation, car un sous-domaine propre pointe activement vers cette adresse.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>\u00c9tape 3 : <strong><strong>Contexte r\u00e9seau pour les services suspects<\/strong><\/strong><\/strong><\/h3>\n\n\n\n<p>L'informaticien souhaite maintenant savoir ce qui se cache derri\u00e8re d'autres sous-domaines inconnus :<\/p>\n\n\n\n<p><strong><strong>\u201eAfficher le graphique du r\u00e9seau pour zulip.locaterisk.com\u201c.\u201c<\/strong><\/strong><\/p>\n\n\n\n<p>L'analyse montre que locaterisk.com est li\u00e9 \u00e0 zulip.locaterisk.com par les r\u00e9sultats CRT_MEMBER (certificat SSL) et SUBDOMAIN (\u00e9num\u00e9ration DNS). L'h\u00f4te exploite une instance de l'application de chat open source \u201eZulip\u201c.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>r\u00e9sultat : <strong>Clart\u00e9 en quelques secondes sur les syst\u00e8mes identifi\u00e9s<\/strong><\/strong><\/h3>\n\n\n\n<p>Gr\u00e2ce \u00e0 la transparence des chemins de d\u00e9couverte, le responsable informatique peut nettoyer l'ensemble de la surface d'attaque :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Identifier le Shadow IT :<\/strong> Des services tels que n8n, Zulip et Snake ont \u00e9t\u00e9 identifi\u00e9s comme services expos\u00e9s.<\/li>\n\n\n\n<li><strong>Trouver des environnements de staging :<\/strong> Trois syst\u00e8mes (testing, preview, app-staging) ne devraient pas \u00eatre publics<\/li>\n\n\n\n<li><strong>Clarifier les responsabilit\u00e9s :<\/strong> Chaque h\u00f4te a un chemin tra\u00e7able \u00e0 partir du domaine racine.<\/li>\n\n\n\n<li><strong>Nettoyer la port\u00e9e :<\/strong> Les h\u00f4tes non associ\u00e9s peuvent \u00eatre directement supprim\u00e9s de l'analyse.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Connaissances<\/strong><\/h3>\n\n\n\n<p>L'\u00e9valuation des 44 sous-domaines fournit les recommandations d'action suivantes :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Syst\u00e8mes productifs (5 trouv\u00e9s) : Cela comprend app, www et backend. Aucune modification n'est n\u00e9cessaire ici.<\/li>\n\n\n\n<li>Services internes (4 trouv\u00e9s) : Il s'agit notamment de n8n, zulip, cal et desk. Action : v\u00e9rifier la protection des acc\u00e8s.<\/li>\n\n\n\n<li>Staging\/Test (3 trouv\u00e9s) : Il s'agit notamment de testing, preview et app-staging. Action : limiter l'acc\u00e8s public.<\/li>\n\n\n\n<li>Autres syst\u00e8mes (3 trouv\u00e9) : Il s'agit notamment de snake, konzern et ct. Action : identifier le responsable.<\/li>\n<\/ul>\n\n\n\n<p><strong>Gain de temps<\/strong><br>Sans l'interface MCP, il faudrait comparer manuellement les fichiers journaux, les enregistrements DNS et les certificats SSL pour reconstruire ces chemins. Ce processus prend g\u00e9n\u00e9ralement plusieurs heures. Gr\u00e2ce \u00e0 l'interface MCP de LocateRisk, la r\u00e9ponse est disponible en <strong>moins de 10 secondes<\/strong> avant.<\/p>\n\n\n\n<p><strong>Conformit\u00e9 et souverainet\u00e9 num\u00e9rique<\/strong><br>La tra\u00e7abilit\u00e9 sans faille de l'infrastructure est une condition de base pour <strong>Conformit\u00e9 \u00e0 la norme NIS-2<\/strong> et le <strong>Protection informatique de base<\/strong>. LocateRisk exploite sa plateforme d'analyse dans des centres de donn\u00e9es certifi\u00e9s \u00e0 <strong>l'Allemagne et l'UE<\/strong>. Cela garantit que les informations sensibles sur votre surface d'attaque sont trait\u00e9es conform\u00e9ment au RGPD et restent prot\u00e9g\u00e9es contre l'acc\u00e8s par le US Cloud Act.<\/p>\n\n\n\n<div class=\"wp-block-lr-faq-module\"><div class=\"content\"><h3><strong>FAQ technique : <strong>D\u00e9couverte de l'infrastructure<\/strong><\/strong><\/h3><div class=\"faq-topic\"><hr\/><div class=\"collapsible-title\"><a class=\"pr-4\"><strong><strong>Puis-je utiliser le MCP de LocateRisk avec des mod\u00e8les d'IA h\u00e9berg\u00e9s localement ?<\/strong><\/strong><\/a><img class=\"collapse-toggle\" srcset=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@3x.png 3x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@2x.png 2x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus.png 1x\"\/><\/div><div class=\"collapsible-content\"><p class=\"font-normal\">L'un des principaux avantages de l'interface MCP est <strong>Souverainet\u00e9 dans le choix du mod\u00e8le<\/strong>. Les entreprises peuvent connecter directement leur propre infrastructure d'IA - comme les instances h\u00e9berg\u00e9es localement de Llama 3 ou les instances priv\u00e9es de ChatGPT. Comme le traitement des donn\u00e9es de LocateRisk est effectu\u00e9 dans des centres de donn\u00e9es certifi\u00e9s \u00e0 <strong>l'Allemagne et l'UE<\/strong> est effectu\u00e9e, l'ensemble de la cha\u00eene reste conforme au RGPD et prot\u00e9g\u00e9e contre le US Cloud Act.<\/p><\/div><\/div><div class=\"faq-topic\"><hr\/><div class=\"collapsible-title\"><a class=\"pr-4\"><strong><strong>Comment une IA d\u00e9tecte-t-elle automatiquement les d\u00e9rives de configuration via l'interface MCP ?<\/strong><\/strong><\/a><img class=\"collapse-toggle\" srcset=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@3x.png 3x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@2x.png 2x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus.png 1x\"\/><\/div><div class=\"collapsible-content\"><p class=\"font-normal\">Gr\u00e2ce \u00e0 l'acc\u00e8s \u00e0 l'historique complet de plus de 60 scans, une IA peut, via le MCP, \u00e9tablir un diagnostic pr\u00e9cis. <strong>Analyse delta<\/strong> de l'entreprise. Elle identifie imm\u00e9diatement les \u00e9carts par rapport \u00e0 l'\u00e9tat th\u00e9orique, par exemple de nouveaux ports ouverts, desiphers SSL modifi\u00e9s ou des sous-domaines inconnus. Au lieu de passer en revue des centaines de r\u00e9sultats, l'analyste re\u00e7oit un message prioritaire sur le changement concret et son impact en termes de risques.<\/p><\/div><\/div><div class=\"faq-topic\"><hr\/><div class=\"collapsible-title\"><a class=\"pr-4\"><strong><strong>L'architecture LocateRisk est-elle conforme au EU AI Act ?<\/strong><\/strong><\/a><img class=\"collapse-toggle\" srcset=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@3x.png 3x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@2x.png 2x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus.png 1x\"\/><\/div><div class=\"collapsible-content\"><p class=\"font-normal\">Comme LocateRisk fournit l'interface MCP en tant que facilitateur technique et que le contr\u00f4le du mod\u00e8le d'IA choisi revient au client, cette configuration prend en charge une <strong>utilisation transparente et responsable de l'IA<\/strong>. Les charges utiles de donn\u00e9es transmises sont de nature purement technique. Cela facilite le respect des r\u00e9glementations europ\u00e9ennes en mati\u00e8re d'IA, car aucune d\u00e9cision de type \"bo\u00eete noire\" n'est impos\u00e9e, la logique d'analyse restant du ressort de l'utilisateur.<\/p><\/div><\/div><div class=\"faq-topic\"><hr\/><div class=\"collapsible-title\"><a class=\"pr-4\"><strong><strong>Comment la connexion MCP acc\u00e9l\u00e8re-t-elle l'onboarding des fournisseurs dans le VRM ?<\/strong><\/strong><\/a><img class=\"collapse-toggle\" srcset=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@3x.png 3x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@2x.png 2x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus.png 1x\"\/><\/div><div class=\"collapsible-content\"><p class=\"font-normal\">L'interface permet d'\u00e9changer directement les r\u00e9sultats techniques des scans avec les <strong>639 mod\u00e8les de questionnaires disponibles<\/strong> (par exemple pour TISAX ou ISO 27001). Une IA peut imm\u00e9diatement comparer les faits techniques avec les auto-d\u00e9clarations des fournisseurs. Cela raccourcit le processus, qui passe de v\u00e9rifications ponctuelles \u00e0 une surveillance continue de la cyber cha\u00eene d'approvisionnement (CSCRM), et permet d'\u00e9conomiser des semaines de correspondance.<\/p><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2><br>Demandez maintenant une D\u00e9mo en direct personelle<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identifiez et r\u00e9duisez vos cyber-risques gr\u00e2ce \u00e0 un aper\u00e7u comparable et compr\u00e9hensible de votre s\u00e9curit\u00e9 informatique. Demandez conseil \u00e0 nos experts et d\u00e9couvrez comment LocateRisk peut vous aider \u00e0 r\u00e9soudre vos cyber-risques.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"Pr\u00e9nom\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"Nom\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Courrier \u00e9lectronique\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"T\u00e9l\u00e9phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">Je suis d'accord avec la politique de confidentialit\u00e9<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Demander une d\u00e9mo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>En savoir plus, r\u00e9server une d\u00e9mo ou simplement \u00e9changer quelques mots ? Nous nous en r\u00e9jouissons !<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Votre Contact<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">PDG<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Contactez-nous maintenant<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/fr\/\">Accueil<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/about\/\">par rapport \u00e0 nous<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/impressum\/\">mentiones l\u00e9gales<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/datenschutz\/\">Confidentialit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/agb.pdf\">CONDITIONS G\u00c9N\u00c9RALES DE VENTE<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/jobs\/\">Carri\u00e8re<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">s\u00e9curit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Centre de confiance<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>L'identification de l'infrastructure inconnue est une t\u00e2che essentielle dans la gestion des surfaces d'attaque externes (EASM). LocateRisk met \u00e0 disposition une interface sp\u00e9cialis\u00e9e bas\u00e9e sur le Model Context Protocol (MCP). LocateRisk est actuellement le seul fournisseur \u00e0 permettre une communication directe de machine \u00e0 machine qui rend les chemins de d\u00e9couverte complexes des syst\u00e8mes informatiques imm\u00e9diatement exploitables par l'intelligence artificielle.<\/p>","protected":false},"author":17,"featured_media":8245,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[95,94,92,97,98,91,4,8,88,93,89,90,37,96,99],"class_list":["post-8061","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-automatisierter-scan-vergleich-it-sicherheit","tag-cyber-vendor-risk-management","tag-easm","tag-easm-tool-mit-mcp-support","tag-effizienzsteigerung-it-security-analyst","tag-external-attack-surface-management","tag-it-sicherheit","tag-it-sicherheitsanalysen","tag-ki-native-sicherheitsanalyse","tag-locaterisk","tag-mcp-schnittstelle","tag-model-context-protocol","tag-nis2","tag-sicherheits-reporting-automatisieren-ki","tag-supply-chain-risk-management-nis-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM - LocateRisk<\/title>\n<meta name=\"description\" content=\"Verbinden Sie Ihre KI per MCP mit LocateRisk und identifizieren Sie Schatten-IT, Staging-Systeme und unbekannte Hosts in unter 10 Sekunden \u2013 DSGVO-konform aus der EU.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/fr\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Verbinden Sie Ihre KI per MCP mit LocateRisk und identifizieren Sie Schatten-IT, Staging-Systeme und unbekannte Hosts in unter 10 Sekunden \u2013 DSGVO-konform aus der EU.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/fr\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-18T11:30:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-18T11:57:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Shaima Luc\u00eda El Qaouti\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shaima Luc\u00eda El Qaouti\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/\"},\"author\":{\"name\":\"Shaima Luc\u00eda El Qaouti\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/db0ff14304cd2bcafbc27d3c7d470cc7\"},\"headline\":\"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM\",\"datePublished\":\"2026-05-18T11:30:07+00:00\",\"dateModified\":\"2026-05-18T11:57:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/\"},\"wordCount\":1071,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png\",\"keywords\":[\"Automatisierter Scan-Vergleich IT-Sicherheit\",\"Cyber Vendor Risk Management\",\"EASM\",\"EASM Tool mit MCP-Support\",\"Effizienzsteigerung IT-Security-Analyst\",\"External Attack Surface Management\",\"IT-Sicherheit\",\"IT-Sicherheitsanalysen\",\"KI-native Sicherheitsanalyse\",\"LocateRisk\",\"MCP-Schnittstelle\",\"Model Context Protocol\",\"NIS2\",\"Sicherheits-Reporting automatisieren KI\",\"Supply Chain Risk Management NIS-2\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/\",\"name\":\"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png\",\"datePublished\":\"2026-05-18T11:30:07+00:00\",\"dateModified\":\"2026-05-18T11:57:56+00:00\",\"description\":\"Verbinden Sie Ihre KI per MCP mit LocateRisk und identifizieren Sie Schatten-IT, Staging-Systeme und unbekannte Hosts in unter 10 Sekunden \u2013 DSGVO-konform aus der EU.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png\",\"width\":600,\"height\":600,\"caption\":\"LocateRisk MCP Case Study 4 Shadow IT Teaser\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/db0ff14304cd2bcafbc27d3c7d470cc7\",\"name\":\"Shaima Luc\u00eda El Qaouti\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g\",\"caption\":\"Shaima Luc\u00eda El Qaouti\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM - LocateRisk","description":"Verbinden Sie Ihre KI per MCP mit LocateRisk und identifizieren Sie Schatten-IT, Staging-Systeme und unbekannte Hosts in unter 10 Sekunden \u2013 DSGVO-konform aus der EU.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/fr\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/","og_locale":"fr_FR","og_type":"article","og_title":"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM - LocateRisk","og_description":"Verbinden Sie Ihre KI per MCP mit LocateRisk und identifizieren Sie Schatten-IT, Staging-Systeme und unbekannte Hosts in unter 10 Sekunden \u2013 DSGVO-konform aus der EU.","og_url":"https:\/\/locaterisk.com\/fr\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/","og_site_name":"LocateRisk","article_published_time":"2026-05-18T11:30:07+00:00","article_modified_time":"2026-05-18T11:57:56+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png","type":"image\/png"}],"author":"Shaima Luc\u00eda El Qaouti","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Shaima Luc\u00eda El Qaouti","Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/"},"author":{"name":"Shaima Luc\u00eda El Qaouti","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/db0ff14304cd2bcafbc27d3c7d470cc7"},"headline":"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM","datePublished":"2026-05-18T11:30:07+00:00","dateModified":"2026-05-18T11:57:56+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/"},"wordCount":1071,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png","keywords":["Automatisierter Scan-Vergleich IT-Sicherheit","Cyber Vendor Risk Management","EASM","EASM Tool mit MCP-Support","Effizienzsteigerung IT-Security-Analyst","External Attack Surface Management","IT-Sicherheit","IT-Sicherheitsanalysen","KI-native Sicherheitsanalyse","LocateRisk","MCP-Schnittstelle","Model Context Protocol","NIS2","Sicherheits-Reporting automatisieren KI","Supply Chain Risk Management NIS-2"],"articleSection":["Blog post"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/","url":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/","name":"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png","datePublished":"2026-05-18T11:30:07+00:00","dateModified":"2026-05-18T11:57:56+00:00","description":"Verbinden Sie Ihre KI per MCP mit LocateRisk und identifizieren Sie Schatten-IT, Staging-Systeme und unbekannte Hosts in unter 10 Sekunden \u2013 DSGVO-konform aus der EU.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/05\/LocateRisk-MCP-Case-Study-4-Shadow-IT-TEaser.png","width":600,"height":600,"caption":"LocateRisk MCP Case Study 4 Shadow IT Teaser"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/schatten-it-eliminieren-mit-locaterisk-mcp-ki-easm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Schatten-IT eliminieren mit LocateRisk MCP &amp; KI | EASM"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Mesurer et comparer la s\u00e9curit\u00e9 informatique","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/db0ff14304cd2bcafbc27d3c7d470cc7","name":"Shaima Luc\u00eda El Qaouti","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g","caption":"Shaima Luc\u00eda El Qaouti"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/8061","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/comments?post=8061"}],"version-history":[{"count":8,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/8061\/revisions"}],"predecessor-version":[{"id":8251,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/8061\/revisions\/8251"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media\/8245"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media?parent=8061"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/categories?post=8061"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/tags?post=8061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}