{"id":8941,"date":"2024-02-21T15:57:22","date_gmt":"2024-02-21T14:57:22","guid":{"rendered":"https:\/\/goelett.com\/?post_type=security&p=8941"},"modified":"2024-03-22T10:12:28","modified_gmt":"2024-03-22T09:12:28","slug":"infrastructure-de-reseau-securisee","status":"publish","type":"security","link":"\/fr\/news-resources\/blog\/security\/infrastructure-de-reseau-securisee\/","title":{"rendered":"Infrastructure de r\u00e9seau s\u00e9curis\u00e9e"},"content":{"rendered":"\n

Nous utilisons des firewalls, des syst\u00e8mes de d\u00e9tection\/pr\u00e9vention des intrusions (IDS\/IPS) et une segmentation du r\u00e9seau pour pr\u00e9venir les intrusions et les acc\u00e8s non autoris\u00e9s. Cela isole nos syst\u00e8mes et r\u00e9duit les risques de fuites de donn\u00e9es. De plus, nous employons des mots de passe robustes et une authentification multifactorielle pour tous les acc\u00e8s au r\u00e9seau.<\/p>\n","protected":false},"excerpt":{"rendered":"

Nous utilisons des firewalls, des syst\u00e8mes de d\u00e9tection\/pr\u00e9vention des intrusions (IDS\/IPS) et une segmentation du r\u00e9seau pour pr\u00e9venir les intrusions et les acc\u00e8s non autoris\u00e9s. Cela isole nos syst\u00e8mes et r\u00e9duit les risques de fuites de donn\u00e9es. De plus, nous employons des mots de passe robustes et une authentification multifactorielle pour tous les acc\u00e8s au […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"security-category":[332],"class_list":["post-8941","security","type-security","status-publish","hentry","security-category-securite-du-reseau"],"acf":[],"yoast_head":"\nInfrastructure de r\u00e9seau s\u00e9curis\u00e9e - Goelett<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"\/fr\/news-resources\/blog\/security\/infrastructure-de-reseau-securisee\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infrastructure de r\u00e9seau s\u00e9curis\u00e9e\" \/>\n<meta property=\"og:description\" content=\"Nous utilisons des firewalls, des syst\u00e8mes de d\u00e9tection\/pr\u00e9vention des intrusions (IDS\/IPS) et une segmentation du r\u00e9seau pour pr\u00e9venir les intrusions et les acc\u00e8s non autoris\u00e9s. Cela isole nos syst\u00e8mes et r\u00e9duit les risques de fuites de donn\u00e9es. De plus, nous employons des mots de passe robustes et une authentification multifactorielle pour tous les acc\u00e8s au […]\" \/>\n<meta property=\"og:url\" content=\"\/fr\/news-resources\/blog\/security\/infrastructure-de-reseau-securisee\/\" \/>\n<meta property=\"og:site_name\" content=\"Goelett\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-22T09:12:28+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"\/fr\/news-resources\/blog\/security\/infrastructure-de-reseau-securisee\/\",\"url\":\"\/fr\/news-resources\/blog\/security\/infrastructure-de-reseau-securisee\/\",\"name\":\"Infrastructure de r\u00e9seau s\u00e9curis\u00e9e - Goelett\",\"isPartOf\":{\"@id\":\"\/#website\"},\"datePublished\":\"2024-02-21T14:57:22+00:00\",\"dateModified\":\"2024-03-22T09:12:28+00:00\",\"breadcrumb\":{\"@id\":\"\/fr\/news-resources\/blog\/security\/infrastructure-de-reseau-securisee\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"\/fr\/news-resources\/blog\/security\/infrastructure-de-reseau-securisee\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"\/fr\/news-resources\/blog\/security\/infrastructure-de-reseau-securisee\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"\/news-resources\/blog\/security\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infrastructure de r\u00e9seau s\u00e9curis\u00e9e\"}]},{\"@type\":\"WebSite\",\"@id\":\"\/#website\",\"url\":\"\/\",\"name\":\"Goelett\",\"description\":\"Solution for Business Travel\",\"publisher\":{\"@id\":\"\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"\/#organization\",\"name\":\"Goelett\",\"url\":\"\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"\/#\/schema\/logo\/image\/\",\"url\":\"\/wp-content\/uploads\/2023\/02\/VariantLogo-ColorBrand-white-GO.png\",\"contentUrl\":\"\/wp-content\/uploads\/2023\/02\/VariantLogo-ColorBrand-white-GO.png\",\"width\":928,\"height\":256,\"caption\":\"Goelett\"},\"image\":{\"@id\":\"\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/goelett\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Infrastructure de r\u00e9seau s\u00e9curis\u00e9e - Goelett","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"\/fr\/news-resources\/blog\/security\/infrastructure-de-reseau-securisee\/","og_locale":"fr_FR","og_type":"article","og_title":"Infrastructure de r\u00e9seau s\u00e9curis\u00e9e","og_description":"Nous utilisons des firewalls, des syst\u00e8mes de d\u00e9tection\/pr\u00e9vention des intrusions (IDS\/IPS) et une segmentation du r\u00e9seau pour pr\u00e9venir les intrusions et les acc\u00e8s non autoris\u00e9s. Cela isole nos syst\u00e8mes et r\u00e9duit les risques de fuites de donn\u00e9es. De plus, nous employons des mots de passe robustes et une authentification multifactorielle pour tous les acc\u00e8s au […]","og_url":"\/fr\/news-resources\/blog\/security\/infrastructure-de-reseau-securisee\/","og_site_name":"Goelett","article_modified_time":"2024-03-22T09:12:28+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"\/fr\/news-resources\/blog\/security\/infrastructure-de-reseau-securisee\/","url":"\/fr\/news-resources\/blog\/security\/infrastructure-de-reseau-securisee\/","name":"Infrastructure de r\u00e9seau s\u00e9curis\u00e9e - Goelett","isPartOf":{"@id":"\/#website"},"datePublished":"2024-02-21T14:57:22+00:00","dateModified":"2024-03-22T09:12:28+00:00","breadcrumb":{"@id":"\/fr\/news-resources\/blog\/security\/infrastructure-de-reseau-securisee\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["\/fr\/news-resources\/blog\/security\/infrastructure-de-reseau-securisee\/"]}]},{"@type":"BreadcrumbList","@id":"\/fr\/news-resources\/blog\/security\/infrastructure-de-reseau-securisee\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"\/news-resources\/blog\/security\/"},{"@type":"ListItem","position":2,"name":"Infrastructure de r\u00e9seau s\u00e9curis\u00e9e"}]},{"@type":"WebSite","@id":"\/#website","url":"\/","name":"Goelett","description":"Solution for Business Travel","publisher":{"@id":"\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"\/#organization","name":"Goelett","url":"\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"\/#\/schema\/logo\/image\/","url":"\/wp-content\/uploads\/2023\/02\/VariantLogo-ColorBrand-white-GO.png","contentUrl":"\/wp-content\/uploads\/2023\/02\/VariantLogo-ColorBrand-white-GO.png","width":928,"height":256,"caption":"Goelett"},"image":{"@id":"\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/goelett\/"]}]}},"_links":{"self":[{"href":"\/fr\/wp-json\/wp\/v2\/security\/8941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"\/fr\/wp-json\/wp\/v2\/security"}],"about":[{"href":"\/fr\/wp-json\/wp\/v2\/types\/security"}],"author":[{"embeddable":true,"href":"\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"\/fr\/wp-json\/wp\/v2\/comments?post=8941"}],"version-history":[{"count":0,"href":"\/fr\/wp-json\/wp\/v2\/security\/8941\/revisions"}],"wp:attachment":[{"href":"\/fr\/wp-json\/wp\/v2\/media?parent=8941"}],"wp:term":[{"taxonomy":"security-category","embeddable":true,"href":"\/fr\/wp-json\/wp\/v2\/security-category?post=8941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}