{"version":"1.0","provider_name":"Goelett","provider_url":"https:\/\/dev.goelett.com\/fr\/","author_name":"admin","author_url":"https:\/\/dev.goelett.com\/fr\/news-resources\/blog\/author\/admin-2\/","title":"Infrastructure de r\u00e9seau s\u00e9curis\u00e9e","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"zuKkd1Flxw\"><a href=\"https:\/\/dev.goelett.com\/fr\/news-resources\/blog\/security\/infrastructure-de-reseau-securisee\/\">Infrastructure de r\u00e9seau s\u00e9curis\u00e9e<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/dev.goelett.com\/fr\/news-resources\/blog\/security\/infrastructure-de-reseau-securisee\/embed\/#?secret=zuKkd1Flxw\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Infrastructure de r\u00e9seau s\u00e9curis\u00e9e\u00a0\u00bb &#8212; Goelett\" data-secret=\"zuKkd1Flxw\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/dev.goelett.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Nous utilisons des firewalls, des syst\u00e8mes de d\u00e9tection\/pr\u00e9vention des intrusions (IDS\/IPS) et une segmentation du r\u00e9seau pour pr\u00e9venir les intrusions et les acc\u00e8s non autoris\u00e9s. Cela isole nos syst\u00e8mes et r\u00e9duit les risques de fuites de donn\u00e9es. De plus, nous employons des mots de passe robustes et une authentification multifactorielle pour tous les acc\u00e8s au [&hellip;]"}