{"id":101203,"date":"2018-07-30T09:08:49","date_gmt":"2018-07-30T08:08:49","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=101203"},"modified":"2024-06-20T14:23:45","modified_gmt":"2024-06-20T13:23:45","slug":"tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\/","title":{"rendered":"TPE et s\u00e9curit\u00e9 informatique : inventaire des principales solutions de protection"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-101205\" title=\"Image utilis\u00e9e sous licence de Shutterstock.com\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_692551105.jpg\" alt=\"TPE et s\u00e9curit\u00e9 informatique : inventaire des principales solutions de protection | Stormshield\" width=\"800\" height=\"534\" \/><\/p>\n<p><strong>Pour de nombreuses petites entreprises, les contraintes financi\u00e8res peuvent justifier de n\u00e9gliger les \u00e9quipements de protection informatique. Une strat\u00e9gie risqu\u00e9e, tant les TPE et PME sont expos\u00e9es aux cyber-menaces. Surtout quand il existe tout un arsenal de solutions efficaces et adapt\u00e9es \u00e0 leur budget.<\/strong><\/p>\n<p>Comme dans toute entreprise, la s\u00e9curit\u00e9 informatique des TPE commence par <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/lhumain-cle-de-la-cybersecurite-des-entreprises\/\">la sensibilisation des collaborateurs<\/a> aux bonnes pratiques : mise \u00e0 jour des syst\u00e8mes d\u2019exploitation et des applications, sauvegarde r\u00e9guli\u00e8re des donn\u00e9es, prudence avec les cl\u00e9s USB, l\u2019ouverture des pi\u00e8ces-jointes dans un e-mail ou l\u2019utilisation de r\u00e9seau WiFi gratuits, etc.<\/p>\n<blockquote><p><em>Les probl\u00e9matiques de co\u00fbts et de comp\u00e9tences internes, inh\u00e9rentes aux TPE, n\u00e9cessitent d\u2019int\u00e9grer des solutions adapt\u00e9es \u00e0 ces contraintes, mais sans sacrifier la s\u00e9curit\u00e9.<\/em><\/p>\n<pre><strong>Matthieu Bonenfant,<\/strong> directeur marketing de Stormshield<\/pre>\n<\/blockquote>\n<p>C\u2019est du c\u00f4t\u00e9 des \u00e9quipements que la donne change par rapport aux grandes entreprises. \u00ab <em>Les probl\u00e9matiques de co\u00fbts et de comp\u00e9tences internes, inh\u00e9rentes aux TPE, n\u00e9cessitent d\u2019int\u00e9grer des solutions adapt\u00e9es \u00e0 ces contraintes, mais sans sacrifier la s\u00e9curit\u00e9<\/em>\u00a0\u00bb, note <strong>Matthieu Bonenfant<\/strong>, directeur marketing de Stormshield. Selon lui, trois mesures phares permettent aux TPE de b\u00e9n\u00e9ficier d\u2019un bon arsenal de d\u00e9fense contre les risques informatiques.<\/p>\n<p>&nbsp;<\/p>\n<h2>Prot\u00e9ger l\u2019entr\u00e9e du r\u00e9seau et la navigation<\/h2>\n<p>Pour une TPE, l\u2019id\u00e9al est de recourir \u00e0 une solution multifonctions assurant la protection en entr\u00e9e de r\u00e9seau. Cette bo\u00eete \u00ab tout-en-un \u00bb comprend un pare-feu, un antivirus, un filtrage d\u2019URL, un VPN, un IPS (un syst\u00e8me de pr\u00e9vention d\u2019intrusion), un antispam, voire un syst\u00e8me d\u2019analyse comportementale afin de d\u00e9tecter les attaques non connues.<\/p>\n<p>&nbsp;<\/p>\n<h2>S\u00e9curiser le poste de travail<\/h2>\n<p>Une deuxi\u00e8me couche de s\u00e9curit\u00e9 s\u2019impose au niveau des postes de travail, avec l\u2019installation d\u2019un agent de protection. Il faut alors privil\u00e9gier des solutions avanc\u00e9es, offrant des fonctions de contr\u00f4le de p\u00e9riph\u00e9riques et d\u2019analyse comportementale, plut\u00f4t que les antivirus classiques et gratuits. Il est \u00e9galement recommand\u00e9 de chiffrer son disque dur en recourant aux outils standards Android et iOS, certains \u00e9tant gratuits selon la version du syst\u00e8me d\u2019exploitation.<\/p>\n<p>&nbsp;<\/p>\n<h2>Contr\u00f4ler l\u2019acc\u00e8s au Cloud<\/h2>\n<p>L\u2019utilisation d\u2019applications externalis\u00e9es dans le Cloud (SaaS - <em>Software as a Service<\/em>) n\u00e9cessitent la protection des donn\u00e9es qui y sont stock\u00e9es ou manipul\u00e9es. Il est pr\u00e9f\u00e9rable d\u2019opter pour des plateformes de travail collaboratif qui proposent des fonctionnalit\u00e9s de s\u00e9curit\u00e9 int\u00e9gr\u00e9es ou additionnelles, tels que Office 365, G-Suite de Google ou une solution packag\u00e9e par un partenaire informatique de confiance.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pour de nombreuses petites entreprises, les contraintes financi\u00e8res peuvent justifier de n\u00e9gliger les \u00e9quipements de protection informatique. Une strat\u00e9gie risqu\u00e9e, tant les TPE et PME sont expos\u00e9es aux cyber-menaces. Surtout quand il existe tout un arsenal de solutions efficaces et adapt\u00e9es \u00e0 leur budget. Comme&#8230;<\/p>\n","protected":false},"author":29,"featured_media":101205,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1608],"tags":[4363],"business_size":[681],"industry":[701],"help_mefind":[],"features":[],"type_security":[1853,754,756,758],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1595,1570,1530],"class_list":["post-101203","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-paroles-experts","tag-la-cybersecurite-premiers-pas","business_size-pme","industry-operateurs-et-mssp","type_security-cloud-fr","type_security-donnees","type_security-postes-et-serveurs","type_security-reseaux","listing_product-breach-fighter-fr","listing_product-sds-fr","listing_product-sns-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber-s\u00e9curit\u00e9 : quelles solutions pour les TPE ? | Stormshield<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez une s\u00e9lection des moyens de protection informatique particuli\u00e8rement adapt\u00e9s aux besoins des TPE et \u00e0 leurs contraintes budg\u00e9taires.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber-s\u00e9curit\u00e9 : quelles solutions pour les TPE ? | Stormshield\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez une s\u00e9lection des moyens de protection informatique particuli\u00e8rement adapt\u00e9s aux besoins des TPE et \u00e0 leurs contraintes budg\u00e9taires.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-30T08:08:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-20T13:23:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_692551105.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthieu Bonenfant\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthieu Bonenfant\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\\\/\"},\"author\":{\"name\":\"Matthieu Bonenfant\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/9f09d885bd0bdc0f381dca0ac145ae8f\"},\"headline\":\"TPE et s\u00e9curit\u00e9 informatique : inventaire des principales solutions de protection\",\"datePublished\":\"2018-07-30T08:08:49+00:00\",\"dateModified\":\"2024-06-20T13:23:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\\\/\"},\"wordCount\":474,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_692551105.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - premiers pas\"],\"articleSection\":[\"Paroles d'experts\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\\\/\",\"name\":\"Cyber-s\u00e9curit\u00e9 : quelles solutions pour les TPE ? | Stormshield\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_692551105.jpg\",\"datePublished\":\"2018-07-30T08:08:49+00:00\",\"dateModified\":\"2024-06-20T13:23:45+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/9f09d885bd0bdc0f381dca0ac145ae8f\"},\"description\":\"D\u00e9couvrez une s\u00e9lection des moyens de protection informatique particuli\u00e8rement adapt\u00e9s aux besoins des TPE et \u00e0 leurs contraintes budg\u00e9taires.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_692551105.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_692551105.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TPE et s\u00e9curit\u00e9 informatique : inventaire des principales solutions de protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/9f09d885bd0bdc0f381dca0ac145ae8f\",\"name\":\"Matthieu Bonenfant\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9717a7710731c7ffe5eded4032ec1b74baa307cab4b8776644470ded13825ca9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9717a7710731c7ffe5eded4032ec1b74baa307cab4b8776644470ded13825ca9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9717a7710731c7ffe5eded4032ec1b74baa307cab4b8776644470ded13825ca9?s=96&d=mm&r=g\",\"caption\":\"Matthieu Bonenfant\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber-s\u00e9curit\u00e9 : quelles solutions pour les TPE ? | Stormshield","description":"D\u00e9couvrez une s\u00e9lection des moyens de protection informatique particuli\u00e8rement adapt\u00e9s aux besoins des TPE et \u00e0 leurs contraintes budg\u00e9taires.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyber-s\u00e9curit\u00e9 : quelles solutions pour les TPE ? | Stormshield","og_description":"D\u00e9couvrez une s\u00e9lection des moyens de protection informatique particuli\u00e8rement adapt\u00e9s aux besoins des TPE et \u00e0 leurs contraintes budg\u00e9taires.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\/","og_site_name":"Stormshield","article_published_time":"2018-07-30T08:08:49+00:00","article_modified_time":"2024-06-20T13:23:45+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_692551105.jpg","type":"image\/jpeg"}],"author":"Matthieu Bonenfant","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Matthieu Bonenfant","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\/"},"author":{"name":"Matthieu Bonenfant","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/9f09d885bd0bdc0f381dca0ac145ae8f"},"headline":"TPE et s\u00e9curit\u00e9 informatique : inventaire des principales solutions de protection","datePublished":"2018-07-30T08:08:49+00:00","dateModified":"2024-06-20T13:23:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\/"},"wordCount":474,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_692551105.jpg","keywords":["La cybers\u00e9curit\u00e9 - premiers pas"],"articleSection":["Paroles d'experts"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\/","name":"Cyber-s\u00e9curit\u00e9 : quelles solutions pour les TPE ? | Stormshield","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_692551105.jpg","datePublished":"2018-07-30T08:08:49+00:00","dateModified":"2024-06-20T13:23:45+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/9f09d885bd0bdc0f381dca0ac145ae8f"},"description":"D\u00e9couvrez une s\u00e9lection des moyens de protection informatique particuli\u00e8rement adapt\u00e9s aux besoins des TPE et \u00e0 leurs contraintes budg\u00e9taires.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_692551105.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_692551105.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/tpe-et-securite-informatique-inventaire-des-principales-solutions-de-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"TPE et s\u00e9curit\u00e9 informatique : inventaire des principales solutions de protection"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/9f09d885bd0bdc0f381dca0ac145ae8f","name":"Matthieu Bonenfant","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/9717a7710731c7ffe5eded4032ec1b74baa307cab4b8776644470ded13825ca9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9717a7710731c7ffe5eded4032ec1b74baa307cab4b8776644470ded13825ca9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9717a7710731c7ffe5eded4032ec1b74baa307cab4b8776644470ded13825ca9?s=96&d=mm&r=g","caption":"Matthieu Bonenfant"}}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/101203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=101203"}],"version-history":[{"count":6,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/101203\/revisions"}],"predecessor-version":[{"id":548895,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/101203\/revisions\/548895"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/101205"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=101203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=101203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=101203"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=101203"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=101203"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=101203"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=101203"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=101203"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=101203"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=101203"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=101203"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=101203"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=101203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}