{"id":12603,"date":"2024-10-22T21:06:17","date_gmt":"2024-10-22T21:06:17","guid":{"rendered":"https:\/\/logient.com\/?post_type=service&#038;p=12603"},"modified":"2024-10-30T14:51:04","modified_gmt":"2024-10-30T14:51:04","slug":"cybersecurite","status":"publish","type":"service","link":"https:\/\/logient.com\/fr\/service\/cybersecurite\/","title":{"rendered":"Cybers\u00e9curit\u00e9"},"content":{"rendered":"<section class=\"section  section-tabs auto background-color-black \"\n    >\n<div class=\"container-pd\">\n    <div class=\"tabs row \">\n        <div class=\"col-lg-5\">\n            <div class=\"flex-column-56\">\n                                    <h2 class=\"h2\">Une approche int\u00e9gr\u00e9e en cybers\u00e9curit\u00e9 et gestion des risques<\/h2>\n                            <\/div>\n        <\/div>\n        <div class=\"offset-lg-1 col-lg-6\">\n            <div class=\"tab-content\">\n                <div class=\"tab-content-item active\">\n                    <div class=\"flex-column-56\">\n                                                <div class=\"flex-column-24 \">\n                    \n            <div class=\"block-level flex-column-24\">\n                    <div class=\"block-level-title largeText\">Assurez la continuit\u00e9 des affaires<\/div>\n                          <div class=\"block-level-progress\"><\/div>\n        <\/div>\n                    \n            <div class=\"block-level flex-column-24\">\n                    <div class=\"block-level-title largeText\">Prot\u00e9gez vos investissements et votre r\u00e9putation<\/div>\n                          <div class=\"block-level-progress\"><\/div>\n        <\/div>\n                    \n            <div class=\"block-level flex-column-24\">\n                    <div class=\"block-level-title largeText\">Garantissez votre conformit\u00e9<\/div>\n                          <div class=\"block-level-progress\"><\/div>\n        <\/div>\n            <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n\n<\/section>\n\n\n<section class=\"section  section-tabs auto  \"\n    >\n<div class=\"container-pd\">\n    <div class=\" row align-items-center\">\n        <div class=\"col-lg-12 \">\n            <div class=\"flex-column-56\">\n                <div class=\"flex-column-24\" >\n                    <h2 class=\"h2\">Tests d\u2019intrusion<\/h2>\n                    <div class=\"defaultText\"><\/div>\n                <\/div>\n                <div class=\"row\">\n                  <div class=\"steps grid-2\">\n                                          <div class=\"flex-column-24 \">\n                                                                          <div class=\"defaultText flex-column-20 wisiwyg\"><p>Simulez p\u00e9riodiquement des cyberattaques r\u00e9elles pour \u00e9valuer les d\u00e9fenses, identifier les vuln\u00e9rabilit\u00e9s exploitables par des m\u00e9thodes intrusives, et am\u00e9liorer la posture de s\u00e9curit\u00e9 globale de votre organisation.<\/p>\n<\/div>\n                                              <\/div>\n                                                              <div class=\"flex-column-24\">\n                                                                          <div class=\"defaultText flex-column-20 wisiwyg\"><ul>\n<li><strong>Renforcez votre r\u00e9silience<\/strong><\/li>\n<li><strong>Identifiez les failles critiques<\/strong><\/li>\n<li><strong>Am\u00e9liorez la s\u00e9curit\u00e9 globale<\/strong><\/li>\n<\/ul>\n<\/div>\n                                              <\/div>\n                                      <\/div>\n                <\/div>\n                          <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n\n<\/section>\n\n<section class=\"section  section-tabs auto  \"\n    >\n<div class=\"container-pd\">\n    <div class=\" row align-items-center\">\n        <div class=\"col-lg-12 \">\n            <div class=\"flex-column-56\">\n                <div class=\"flex-column-24\" >\n                    <h2 class=\"h2\">Balayages de vuln\u00e9rabilit\u00e9s<\/h2>\n                    <div class=\"defaultText\"><\/div>\n                <\/div>\n                <div class=\"row\">\n                  <div class=\"steps grid-2\">\n                                          <div class=\"flex-column-24 \">\n                                                                          <div class=\"defaultText flex-column-20 wisiwyg\"><p>R\u00e9alisez des analyses non intrusives et automatis\u00e9es pour d\u00e9tecter et corriger r\u00e9guli\u00e8rement les faiblesses potentielles de s\u00e9curit\u00e9, garantissant une protection continue contre les menaces et vuln\u00e9rabilit\u00e9s \u00e9mergentes.<\/p>\n<\/div>\n                                              <\/div>\n                                                              <div class=\"flex-column-24\">\n                                                                          <div class=\"defaultText flex-column-20 wisiwyg\"><ul>\n<li><strong>Protection continue<\/strong><\/li>\n<li><strong>R\u00e9duction des risques<\/strong><\/li>\n<li><strong>Optimisez votre conformit\u00e9\u00a0<\/strong><\/li>\n<\/ul>\n<\/div>\n                                              <\/div>\n                                      <\/div>\n                <\/div>\n                          <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n\n<\/section>\n\n\n\n<section class=\"section  section-tabs auto n_columns background-color-gray \"\n    >\n<div class=\"container-pd\">\n            <div class=\" row steps_column\">\n            <div class=\"col-lg-8\">\n                <div class=\"flex-column-56\" >\n                    <h2 class=\"h2\">Nos forfaits de tests d\u2019intrusion<\/h2>\n                <\/div>\n            <\/div>\n            <div class=\"col-lg-12\">\n                              <div class=\" steps grid-3 padd-0 \">\n                                      <div class=\" flex-column-56\">\n                      <div class=\"step step_column flex-column-24\">\n                                                  <h3 class=\"h3\">Essentiel<\/h3>\n                                                                          <div class=\"defaultText\">jusqu&rsquo;\u00e0 60% des vuln\u00e9rabilit\u00e9s<br \/>\r\n<br \/>\r\nRencontre de d\u00e9marrage<br \/>\r\nTest d&rsquo;intrusion automatis\u00e9 (production)<br \/>\r\nBalayage de vuln\u00e9rabilit\u00e9s (production)<br \/>\r\nValidation des faux positifs<br \/>\r\nRapport avec r\u00e9sultats et recommandations<\/div>\n                                              <\/div>\n                    <\/div>\n                                      <div class=\" flex-column-56\">\n                      <div class=\"step step_column flex-column-24\">\n                                                  <h3 class=\"h3\">Standard<\/h3>\n                                                                          <div class=\"defaultText\">jusqu&rsquo;\u00e0 85% des vuln\u00e9rabilit\u00e9s<br \/>\r\n<br \/>\r\nRencontre de d\u00e9marrage<br \/>\r\nTest d&rsquo;intrusion automatis\u00e9 (production)<br \/>\r\nBalayage de vuln\u00e9rabilit\u00e9s (production)<br \/>\r\nValidation des faux positifs<br \/>\r\nRapport avec r\u00e9sultats et recommandations<br \/>\r\n+ Rencontre et pr\u00e9sentation du rapport<br \/>\r\n+ Test d&rsquo;intrusion\u00a0manuel (production)<br \/>\r\n+ Top 10 OWASP<br \/>\r\n+ Test de charge &#8211; Denial of Service (DoS)<\/div>\n                                              <\/div>\n                    <\/div>\n                                      <div class=\" flex-column-56\">\n                      <div class=\"step step_column flex-column-24\">\n                                                  <h3 class=\"h3\">Avanc\u00e9<\/h3>\n                                                                          <div class=\"defaultText\">jusqu&rsquo;\u00e0 95% des vuln\u00e9rabilit\u00e9s<br \/>\r\n<br \/>\r\nRencontre de d\u00e9marrage<br \/>\r\nTest d&rsquo;intrusion automatis\u00e9 (production)<br \/>\r\nBalayage de vuln\u00e9rabilit\u00e9s (production)<br \/>\r\nValidation des faux positifs<br \/>\r\nRapport avec r\u00e9sultats et recommandations<br \/>\r\nRencontre et pr\u00e9sentation du rapport<br \/>\r\nTest d&rsquo;intrusion\u00a0manuel (production)<br \/>\r\nTop 10 OWASP<br \/>\r\nTest de charge &#8211; Denial of Service (DoS)<br \/>\r\n+ Recherche de domaine Dark Web<br \/>\r\n+ Test &#8211; API\u00a0 (production)<\/div>\n                                              <\/div>\n                    <\/div>\n                                  <\/div>\n                          <\/div>\n        <\/div>\n    \n<\/div>\n\n<\/section>\n\n<section class=\"section  section-text-center-grid-images auto grid-imgs-section  \"\n    >\n<div class=\"container-pd\">\n          <div class=\" row align-items-center\">\n            <div class=\"col-lg-12 \">\n                <div class=\"flex-column-56\" style=\"text-align:center;\">\n                                      <h2 class=\"h2\">Les outils que nous utilisons <\/h2>\n                                                          <div class=\" row align-items-center\">\n                      <div class=\"col-lg-2 \"><\/div>\n                      <div class=\"col-lg-8 \">\n                        <div class=\" row align-items-center justify-content-center\">\n                                                      <div class=\"col-lg-2 col-6\">\n                              <div class=\"flex-column-56\" >\n                                <div class=\"image-container\" style=\"text-align:center;\">\n                                  <img decoding=\"async\" style=\"width: 100%;\" src=\"https:\/\/logient.com\/app\/uploads\/2024\/10\/images-4-removebg-preview.png\"  alt=\"\">\n                                <\/div>\n                              <\/div>\n                            <\/div>\n                                                      <div class=\"col-lg-2 col-6\">\n                              <div class=\"flex-column-56\" >\n                                <div class=\"image-container\" style=\"text-align:center;\">\n                                  <img decoding=\"async\" style=\"width: 100%;\" src=\"https:\/\/logient.com\/app\/uploads\/2024\/10\/snyk.png\"  alt=\"\">\n                                <\/div>\n                              <\/div>\n                            <\/div>\n                                                      <div class=\"col-lg-2 col-6\">\n                              <div class=\"flex-column-56\" >\n                                <div class=\"image-container\" style=\"text-align:center;\">\n                                  <img decoding=\"async\" style=\"width: 100%;\" src=\"https:\/\/logient.com\/app\/uploads\/2024\/10\/0-kgieclpu9w6clfas.png\"  alt=\"\">\n                                <\/div>\n                              <\/div>\n                            <\/div>\n                                                      <div class=\"col-lg-2 col-6\">\n                              <div class=\"flex-column-56\" >\n                                <div class=\"image-container\" style=\"text-align:center;\">\n                                  <img decoding=\"async\" style=\"width: 100%;\" src=\"https:\/\/logient.com\/app\/uploads\/2024\/10\/burp-suite-proxies-e6501bcb84.png\"  alt=\"\">\n                                <\/div>\n                              <\/div>\n                            <\/div>\n                                                  <\/div>\n                      <\/div>\n                      <div class=\"col-lg-2 \"><\/div>\n                    <\/div>\n                                  <\/div>\n            <\/div>\n        <\/div>\n  <\/div>\n\n<\/section>\n\n<section class=\"section  section-tabs auto center-txt-block  \"\n    >\n<div class=\"container-pd\">\n    <div class=\"tabs row align-items-center\">\n        <div class=\"col-lg-2 \"><\/div>\n        <div class=\"col-lg-8 \">\n            <div class=\"flex-column-56\" >\n                                    <h2 class=\"h2\">S\u00e9curiser vos fronti\u00e8res num\u00e9riques :  une approche en 5 \u00e9tapes<\/h2>\n                                            <\/div>\n        <\/div>\n        <div class=\"col-lg-2 \"><\/div>\n    <\/div>\n<\/div>\n\n<\/section>\n\n<section class=\"section  section-steps  defaultText \"\n    >\n    <div class=\"container-steps\">\n        <div class=\"step-fixed\">\n            <div class=\"container-pd\">\n                        <div class=\"step-header desktop-only\" style=\"display: none;\">\n              <span class=\"current-step\">01<\/span> \/ <span class=\"all-step-count\">04<\/span>\n          <\/div>\n          <div class=\"steps-list\">\n              <div class=\"steps flex-column-64\">\n                                        <div class=\"step\">\n                          <div class=\"step-header\">\n                              <span class=\"current-step\">01<\/span> \/ <span\n                                  class=\"all-step-count\">05<\/span>\n                          <\/div>\n                          <div class=\"row step-content\">\n                              <div class=\"col-lg-6\">\n                                                                        <h3 class=\"step-title h2\">Planification<\/h3>\n                                                                <\/div>\n                              <div class=\"offset-lg-1 col-lg-5\">\n                                                                        <div class=\"step-description xlargeText\">D\u00e9finir la port\u00e9e, les r\u00e8gles et les objectifs de l\u2019\u00e9valuation pour assurer une strat\u00e9gie claire et efficace, adapt\u00e9e aux besoins et objectifs organisationnels.<br \/>\r\n<br \/>\r\n\u2022  Port\u00e9e et objectifs<br \/>\r\n\u2022  R\u00e8gles d\u2019engagement<br \/>\r\n\u2022  Calendrier du projet et jalons<br \/>\r\n\u2022  Plan d\u2019\u00e9valuation des risques<\/div>\n                                                                <\/div>\n                          <\/div>\n                      <\/div>\n                                        <div class=\"step\">\n                          <div class=\"step-header\">\n                              <span class=\"current-step\">02<\/span> \/ <span\n                                  class=\"all-step-count\">05<\/span>\n                          <\/div>\n                          <div class=\"row step-content\">\n                              <div class=\"col-lg-6\">\n                                                                        <h3 class=\"step-title h2\">D\u00e9couverte<\/h3>\n                                                                <\/div>\n                              <div class=\"offset-lg-1 col-lg-5\">\n                                                                        <div class=\"step-description xlargeText\">Effectuer des analyses approfondies et de la reconnaissance pour identifier les vuln\u00e9rabilit\u00e9s potentielles, les faiblesses et les points d\u2019entr\u00e9e dans le syst\u00e8me ou le r\u00e9seau.<br \/>\r\n<br \/>\r\n\u2022  Exploitation des vuln\u00e9rabilit\u00e9s<br \/>\r\n\u2022  Analyse des vecteurs d&rsquo;attaque<br \/>\r\n\u2022  Journal des faiblesses de s\u00e9curit\u00e9<\/div>\n                                                                <\/div>\n                          <\/div>\n                      <\/div>\n                                        <div class=\"step\">\n                          <div class=\"step-header\">\n                              <span class=\"current-step\">03<\/span> \/ <span\n                                  class=\"all-step-count\">05<\/span>\n                          <\/div>\n                          <div class=\"row step-content\">\n                              <div class=\"col-lg-6\">\n                                                                        <h3 class=\"step-title h2\">Attaque<\/h3>\n                                                                <\/div>\n                              <div class=\"offset-lg-1 col-lg-5\">\n                                                                        <div class=\"step-description xlargeText\">Tenter d\u2019exploiter les vuln\u00e9rabilit\u00e9s identifi\u00e9es pour v\u00e9rifier leur existence et \u00e9valuer leur impact potentiel, en simulant des sc\u00e9narios d\u2019attaque r\u00e9els.<br \/>\r\n<br \/>\r\n\u2022  Rapport d\u2019exploitation<br \/>\r\n\u2022  Preuve de concept (PoC) des vuln\u00e9rabilit\u00e9s<br \/>\r\n\u2022  Analyse des vecteurs d\u2019attaque<br \/>\r\n\u2022  Journal des faiblesses de s\u00e9curit\u00e9<\/div>\n                                                                <\/div>\n                          <\/div>\n                      <\/div>\n                                        <div class=\"step\">\n                          <div class=\"step-header\">\n                              <span class=\"current-step\">04<\/span> \/ <span\n                                  class=\"all-step-count\">05<\/span>\n                          <\/div>\n                          <div class=\"row step-content\">\n                              <div class=\"col-lg-6\">\n                                                                        <h3 class=\"step-title h2\">Rapport<\/h3>\n                                                                <\/div>\n                              <div class=\"offset-lg-1 col-lg-5\">\n                                                                        <div class=\"step-description xlargeText\">Compiler des rapports d\u00e9taill\u00e9s tout en fournissant des recommandations concr\u00e8tes pour rem\u00e9dier aux failles.<br \/>\r\n<br \/>\r\n\u2022  R\u00e9sum\u00e9 ex\u00e9cutif<br \/>\r\n\u2022  Rapport final complet<br \/>\r\n\u2022  Analyse d\u00e9taill\u00e9e des vuln\u00e9rabilit\u00e9s<br \/>\r\n\u2022  Recommandations de rem\u00e9diation<br \/>\r\n\u2022  Revue post-intervention et plan d\u2019action<\/div>\n                                                                <\/div>\n                          <\/div>\n                      <\/div>\n                                        <div class=\"step\">\n                          <div class=\"step-header\">\n                              <span class=\"current-step\">05<\/span> \/ <span\n                                  class=\"all-step-count\">05<\/span>\n                          <\/div>\n                          <div class=\"row step-content\">\n                              <div class=\"col-lg-6\">\n                                                                        <h3 class=\"step-title h2\">Rem\u00e9diation<\/h3>\n                                                                <\/div>\n                              <div class=\"offset-lg-1 col-lg-5\">\n                                                                        <div class=\"step-description xlargeText\">Aligner vos prochaines \u00e9tapes en d\u00e9finissant qui fait quoi, quand et comment. Cela garantit que toutes les vuln\u00e9rabilit\u00e9s identifi\u00e9es sont trait\u00e9es efficacement.<br \/>\r\n<br \/>\r\n\u2022  Plan d\u2019actions correctives<br \/>\r\n\u2022  Attribution des t\u00e2ches, calendrier et strat\u00e9gie de mise en \u0153uvre<br \/>\r\n\u2022  R\u00e9p\u00e9tition de tests<br \/>\r\n\u2022  Suivi en continu<br \/>\r\n\u2022  Plan d\u2019am\u00e9lioration continue<\/div>\n                                                                <\/div>\n                          <\/div>\n                      <\/div>\n                                <\/div>\n          <\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n<section class=\"section  section-liste-right-image-left auto background-color-black \"\n    >\n<div class=\"container-pd\">\n    <div class=\" row align-items-center  \">\n        <div class=\"col-lg-5 flex-column-56\">\n                            <div class=\"image-container \">\n                                            <svg width=\"528\" viewBox=\"0 0 528 528\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                            <defs>\n                                <clipPath id=\"svg-draw-l\">\n                                    <path\n                                        d=\"M436.954 13.6975C432.138 8.88153 429.731 6.47391 426.921 4.7522C424.43 3.22567 421.714 2.10076 418.873 1.41864C415.669 0.64911 412.264 0.64911 405.454 0.64911H22.2734C14.477 0.649011 10.5788 0.649011 7.60091 2.16629C4.9815 3.50101 2.8519 5.631 1.51728 8.25032C0 11.228 0 15.1262 0 22.9228V405.041C0 411.847 0 415.25 0.768533 418.453C1.44986 421.293 2.57378 424.008 4.09891 426.498C5.81914 429.307 8.22467 431.714 13.0356 436.528L91.0442 514.595C95.8601 519.415 98.2681 521.825 101.079 523.548C103.571 525.076 106.288 526.202 109.13 526.885C112.335 527.654 115.742 527.654 122.555 527.654H505.726C513.523 527.654 517.421 527.654 520.399 526.137C523.018 524.802 525.148 522.673 526.483 520.054C528 517.076 528 513.178 528 505.381V123.198C528 116.388 528 112.983 527.231 109.779C526.549 106.939 525.424 104.223 523.897 101.731C522.176 98.9221 519.768 96.5144 514.953 91.6989L436.954 13.6975Z\"\n                                        fill=\"#1D1D1F\" \/>\n                                <\/clipPath>\n                            <\/defs>\n                            <image clip-path=\"url(#svg-draw-l)\" width=\"100%\"\n                                xlink:href=\"https:\/\/logient.com\/app\/uploads\/2024\/10\/francis-060-go.jpg\" \/>\n                        <\/svg>\n                                    <\/div>\n                    <\/div>\n        <div class=\"col-lg-6 offset-lg-1 flex-column-56\">\n                            <h3 class=\"h2\">Rencontrez Francis Venne<\/h3>\n                                        <div class=\"defaultText\">Responsable de la s\u00e9curit\u00e9 informatique chez Logient, Francis g\u00e8re les cadres de conformit\u00e9 et dirige la strat\u00e9gie de cybers\u00e9curit\u00e9. Il accompagne les clients dans l&rsquo;\u00e9valuation des menaces et dans la mise en \u0153uvre de solutions de s\u00e9curit\u00e9. Sa passion et son esprit analytique transforment les d\u00e9fis en opportunit\u00e9s strat\u00e9giques.<br \/>\r\n<br \/>\r\nFrancis est titulaire d&rsquo;un baccalaur\u00e9at en cybers\u00e9curit\u00e9 de l&rsquo;\u00c9cole Polytechnique de Montr\u00e9al et poursuit actuellement un DESS en s\u00e9curit\u00e9 informatique \u00e0 l&rsquo;Universit\u00e9 de Sherbrooke.<\/div>\n                        <div class=\"flex-column-24 \">\n                    \n            <div class=\"block-level flex-column-24\">\n                    <div class=\"block-level-title largeText\">Plus de 10 ans d\u2019exp\u00e9rience en informatique<\/div>\n                          <div class=\"block-level-progress\"><\/div>\n        <\/div>\n                    \n            <div class=\"block-level flex-column-24\">\n                    <div class=\"block-level-title largeText\">Expertise en protection des syst\u00e8mes et en conformit\u00e9<\/div>\n                          <div class=\"block-level-progress\"><\/div>\n        <\/div>\n                    \n            <div class=\"block-level flex-column-24\">\n                    <div class=\"block-level-title largeText\">Approche bas\u00e9e sur l\u2019\u00e9mulation des techniques de hackers<\/div>\n                          <div class=\"block-level-progress\"><\/div>\n        <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n<\/section>","protected":false},"parent":0,"template":"","class_list":["post-12603","service","type-service","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Logient | Expertise | Cybers\u00e9curit\u00e9<\/title>\n<meta name=\"description\" content=\"Assurez votre cybers\u00e9curit\u00e9 avec tests d&#039;intrusion et balayages de vuln\u00e9rabilit\u00e9s de Logient.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/logient.com\/fr\/service\/cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Logient | Expertise | Cybers\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"Assurez votre cybers\u00e9curit\u00e9 avec tests d&#039;intrusion et balayages de vuln\u00e9rabilit\u00e9s de Logient.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/logient.com\/fr\/service\/cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"Logient\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-30T14:51:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/logient.com\/app\/uploads\/2023\/03\/logient-image-de-partage-1200x627-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1202\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/logient.com\/fr\/service\/cybersecurite\/\",\"url\":\"https:\/\/logient.com\/fr\/service\/cybersecurite\/\",\"name\":\"Logient | Expertise | Cybers\u00e9curit\u00e9\",\"isPartOf\":{\"@id\":\"https:\/\/logient.com\/fr\/#website\"},\"datePublished\":\"2024-10-22T21:06:17+00:00\",\"dateModified\":\"2024-10-30T14:51:04+00:00\",\"description\":\"Assurez votre cybers\u00e9curit\u00e9 avec tests d'intrusion et balayages de vuln\u00e9rabilit\u00e9s de Logient.\",\"breadcrumb\":{\"@id\":\"https:\/\/logient.com\/fr\/service\/cybersecurite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/logient.com\/fr\/service\/cybersecurite\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/logient.com\/fr\/service\/cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/logient.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/logient.com\/fr\/#website\",\"url\":\"https:\/\/logient.com\/fr\/\",\"name\":\"Logient\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/logient.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/logient.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/logient.com\/fr\/#organization\",\"name\":\"Logient\",\"url\":\"https:\/\/logient.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/logient.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/logient.com\/app\/uploads\/2023\/09\/group-53-1-scaled-1.jpg\",\"contentUrl\":\"https:\/\/logient.com\/app\/uploads\/2023\/09\/group-53-1-scaled-1.jpg\",\"width\":2560,\"height\":1797,\"caption\":\"Logient\"},\"image\":{\"@id\":\"https:\/\/logient.com\/fr\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Logient | Expertise | Cybers\u00e9curit\u00e9","description":"Assurez votre cybers\u00e9curit\u00e9 avec tests d'intrusion et balayages de vuln\u00e9rabilit\u00e9s de Logient.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/logient.com\/fr\/service\/cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"Logient | Expertise | Cybers\u00e9curit\u00e9","og_description":"Assurez votre cybers\u00e9curit\u00e9 avec tests d'intrusion et balayages de vuln\u00e9rabilit\u00e9s de Logient.","og_url":"https:\/\/logient.com\/fr\/service\/cybersecurite\/","og_site_name":"Logient","article_modified_time":"2024-10-30T14:51:04+00:00","og_image":[{"width":1202,"height":629,"url":"https:\/\/logient.com\/app\/uploads\/2023\/03\/logient-image-de-partage-1200x627-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/logient.com\/fr\/service\/cybersecurite\/","url":"https:\/\/logient.com\/fr\/service\/cybersecurite\/","name":"Logient | Expertise | Cybers\u00e9curit\u00e9","isPartOf":{"@id":"https:\/\/logient.com\/fr\/#website"},"datePublished":"2024-10-22T21:06:17+00:00","dateModified":"2024-10-30T14:51:04+00:00","description":"Assurez votre cybers\u00e9curit\u00e9 avec tests d'intrusion et balayages de vuln\u00e9rabilit\u00e9s de Logient.","breadcrumb":{"@id":"https:\/\/logient.com\/fr\/service\/cybersecurite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/logient.com\/fr\/service\/cybersecurite\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/logient.com\/fr\/service\/cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/logient.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/logient.com\/fr\/#website","url":"https:\/\/logient.com\/fr\/","name":"Logient","description":"","publisher":{"@id":"https:\/\/logient.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/logient.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/logient.com\/fr\/#organization","name":"Logient","url":"https:\/\/logient.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/logient.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/logient.com\/app\/uploads\/2023\/09\/group-53-1-scaled-1.jpg","contentUrl":"https:\/\/logient.com\/app\/uploads\/2023\/09\/group-53-1-scaled-1.jpg","width":2560,"height":1797,"caption":"Logient"},"image":{"@id":"https:\/\/logient.com\/fr\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/logient.com\/fr\/wp-json\/wp\/v2\/service\/12603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logient.com\/fr\/wp-json\/wp\/v2\/service"}],"about":[{"href":"https:\/\/logient.com\/fr\/wp-json\/wp\/v2\/types\/service"}],"wp:attachment":[{"href":"https:\/\/logient.com\/fr\/wp-json\/wp\/v2\/media?parent=12603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}