{"id":1046,"date":"2016-10-21T14:46:58","date_gmt":"2016-10-21T12:46:58","guid":{"rendered":"https:\/\/dev.sicherheitsforum.ch\/?p=1046"},"modified":"2023-03-14T08:57:11","modified_gmt":"2023-03-14T07:57:11","slug":"sechs-tipps-fuer-ein-sicheres-byod-konzept","status":null,"type":"post","link":"https:\/\/news.save.ch\/fr\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/","title":{"rendered":"Six conseils pour un concept BYOD s\u00fbr"},"content":{"rendered":"<figure id=\"attachment_1048\" aria-describedby=\"caption-attachment-1048\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1048\" src=\"https:\/\/sicherheitsforum.ch\/wp-content\/uploads\/2016\/12\/Sechs-Tipps-f\u00fcr-ein-sicheres-BYOD-Konzept-it-security.jpg\" alt=\"\u00a9 depositphotos\" width=\"680\" height=\"454\" \/><figcaption id=\"caption-attachment-1048\" class=\"wp-caption-text\">\u00a9 depositphotos<\/figcaption><\/figure>\n<p>Le BYOD, c'est-\u00e0-dire la possibilit\u00e9 d'int\u00e9grer des terminaux priv\u00e9s tels que des ordinateurs portables, des tablettes ou des smartphones dans les r\u00e9seaux d'entreprise, est entr\u00e9 depuis longtemps dans le quotidien des entreprises. Comme une <a href=\"https:\/\/www.forrester.com\/report\/The%2BTop%2B10%2BTechnology%2BTrends%2BTo%2BWatch%2B2016%2BTo%2B2018\/-\/E-RES120075\" target=\"_blank\" data-cke-saved-href=\"https:\/\/www.forrester.com\/report\/The%2BTop%2B10%2BTechnology%2BTrends%2BTo%2BWatch%2B2016%2BTo%2B2018\/-\/E-RES120075\" rel=\"noopener\">\u00c9tude Forrester <\/a>\u00a0l'approche reste l'une des grandes tendances informatiques, comme le montre l'\u00e9diteur de logiciels <a href=\"https:\/\/www.fabasoft.com\" target=\"_blank\" rel=\"noreferrer noopener\" data-cke-saved-href=\"https:\/\/www.fabasoft.com\">Fabasoft<\/a> \u00e9crit-il. Pour profiter de cette \u00e9volution et d\u00e9samorcer les probl\u00e8mes de s\u00e9curit\u00e9 potentiels, l'entreprise donne six conseils :<\/p>\n<ol>\n<li><strong>Risques<\/strong> <strong>d\u00e9couvrir<\/strong> <strong>et<\/strong> <strong>informer :<\/strong> La premi\u00e8re \u00e9tape d'un programme BYOD r\u00e9ussi consiste \u00e0 analyser de quelle mani\u00e8re les risques li\u00e9s au BYOD peuvent affecter l'entreprise. Les employ\u00e9s doivent \u00e9galement \u00eatre inform\u00e9s des risques potentiels pour leurs donn\u00e9es personnelles et les informations de l'entreprise.<\/li>\n<li><strong>Groupe d'experts<\/strong> <strong>convoqu\u00e9 : <\/strong>Pour la mise en \u0153uvre du programme BYOD, il convient de r\u00e9unir les parties prenantes de l'entreprise ainsi que celles des domaines de l'informatique et de la protection des donn\u00e9es. De cette mani\u00e8re, le sujet peut \u00eatre remis en question sous diff\u00e9rents angles d'expertise et \u00eatre abord\u00e9 de mani\u00e8re efficace.<\/li>\n<li><strong>Directives<\/strong> <strong>de l'entreprise : <\/strong>Quelles r\u00e8gles doivent s'appliquer \u00e0 l'utilisation des appareils mobiles, des tablettes et des ordinateurs portables ? Les terminaux sont-ils par exemple autoris\u00e9s pour un usage priv\u00e9 ? Si oui, quels accords s'appliquent en cas de filtrage des donn\u00e9es ?<\/li>\n<li><strong>Plan de projet<\/strong> <strong>cr\u00e9er : <\/strong>Le plan doit inclure des points tels que \"la gestion des appareils \u00e0 distance\", \"le contr\u00f4le des applications\", \"la conformit\u00e9 aux politiques et les rapports d'audit\", \"le cryptage des donn\u00e9es et des appareils\" et surtout \"le renforcement de la s\u00e9curit\u00e9 du stockage en nuage\". Ce dernier est justement consid\u00e9r\u00e9 par les experts en s\u00e9curit\u00e9 comme une porte ouverte aux attaques de pirates.<\/li>\n<li><strong>Solutions<\/strong> <strong>mettre en \u0153uvre : <\/strong>Au d\u00e9but du programme BYOD, plusieurs petits groupes de test doivent \u00eatre form\u00e9s. Ils se composent de membres des d\u00e9partements qui fournissent \u00e9galement le conseil d'experts. Par la suite, le programme sera progressivement \u00e9largi.<\/li>\n<li><strong>Solutions<\/strong> <strong>nouveau<\/strong><strong> \u00e9valuer : <\/strong>Une r\u00e9\u00e9valuation des solutions devrait avoir lieu \u00e0 intervalles r\u00e9guliers, en \u00e9troite concertation avec les fournisseurs et les conseillers de confiance. Dans ce contexte, les feuilles de route sont un outil pr\u00e9cieux pour l'\u00e9valuation.<\/li>\n<\/ol>\n<p><em>Source : Fabasoft<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>BYOD, also die M\u00f6glichkeit private Endger\u00e4te wie Laptops, Tablets oder Smartphones in Unternehmensnetzwerke zu integrieren, ist l\u00e4ngst im Unternehmensalltag angekommen. Wie eine Forrester Studie \u00a0zeigt, ist der Ansatz auch k\u00fcnftig einer der grossen IT-Trends, wie der Softwareprodukthersteller Fabasoft schreibt. Um von dieser Entwicklung zu profitieren und potenzielle Sicherheitsprobleme zu entsch\u00e4rfen, gibt\u00a0das Unternehmen sechs Tipps: Risiken [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[68],"class_list":["post-1046","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-tipps-und-tricks"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"BYOD","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sechs Tipps f\u00fcr ein sicheres BYOD-Konzept - Save<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/fr\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sechs Tipps f\u00fcr ein sicheres BYOD-Konzept - Save\" \/>\n<meta property=\"og:description\" content=\"BYOD, also die M\u00f6glichkeit private Endger\u00e4te wie Laptops, Tablets oder Smartphones in Unternehmensnetzwerke zu integrieren, ist l\u00e4ngst im Unternehmensalltag angekommen. Wie eine Forrester Studie \u00a0zeigt, ist der Ansatz auch k\u00fcnftig einer der grossen IT-Trends, wie der Softwareprodukthersteller Fabasoft schreibt. Um von dieser Entwicklung zu profitieren und potenzielle Sicherheitsprobleme zu entsch\u00e4rfen, gibt\u00a0das Unternehmen sechs Tipps: Risiken [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/fr\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-21T12:46:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:57:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Sechs-Tipps-fuer-ein-sicheres-BYOD-Konzept-it-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-ein-sicheres-byod-konzept\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-ein-sicheres-byod-konzept\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\"},\"headline\":\"Sechs Tipps f\u00fcr ein sicheres BYOD-Konzept\",\"datePublished\":\"2016-10-21T12:46:58+00:00\",\"dateModified\":\"2023-03-14T07:57:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-ein-sicheres-byod-konzept\\\/\"},\"wordCount\":311,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-ein-sicheres-byod-konzept\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Sechs-Tipps-fuer-ein-sicheres-BYOD-Konzept-it-security.jpg\",\"keywords\":[\"Tipps und Tricks\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-ein-sicheres-byod-konzept\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-ein-sicheres-byod-konzept\\\/\",\"name\":\"Sechs Tipps f\u00fcr ein sicheres BYOD-Konzept - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-ein-sicheres-byod-konzept\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-ein-sicheres-byod-konzept\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Sechs-Tipps-fuer-ein-sicheres-BYOD-Konzept-it-security.jpg\",\"datePublished\":\"2016-10-21T12:46:58+00:00\",\"dateModified\":\"2023-03-14T07:57:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-ein-sicheres-byod-konzept\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-ein-sicheres-byod-konzept\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-ein-sicheres-byod-konzept\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Sechs-Tipps-fuer-ein-sicheres-BYOD-Konzept-it-security.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Sechs-Tipps-fuer-ein-sicheres-BYOD-Konzept-it-security.jpg\",\"width\":1000,\"height\":667,\"caption\":\"\u00a9 depositphotos\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-tipps-fuer-ein-sicheres-byod-konzept\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sechs Tipps f\u00fcr ein sicheres BYOD-Konzept\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/develop.organisator.galledia.ch\"],\"url\":\"https:\\\/\\\/news.save.ch\\\/fr\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Six conseils pour une approche BYOD s\u00fbre - Save","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/fr\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/","og_locale":"fr_FR","og_type":"article","og_title":"Sechs Tipps f\u00fcr ein sicheres BYOD-Konzept - Save","og_description":"BYOD, also die M\u00f6glichkeit private Endger\u00e4te wie Laptops, Tablets oder Smartphones in Unternehmensnetzwerke zu integrieren, ist l\u00e4ngst im Unternehmensalltag angekommen. Wie eine Forrester Studie \u00a0zeigt, ist der Ansatz auch k\u00fcnftig einer der grossen IT-Trends, wie der Softwareprodukthersteller Fabasoft schreibt. Um von dieser Entwicklung zu profitieren und potenzielle Sicherheitsprobleme zu entsch\u00e4rfen, gibt\u00a0das Unternehmen sechs Tipps: Risiken [&hellip;]","og_url":"https:\/\/news.save.ch\/fr\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/","og_site_name":"Save","article_published_time":"2016-10-21T12:46:58+00:00","article_modified_time":"2023-03-14T07:57:11+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Sechs-Tipps-fuer-ein-sicheres-BYOD-Konzept-it-security.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/"},"author":{"name":"admin","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b"},"headline":"Sechs Tipps f\u00fcr ein sicheres BYOD-Konzept","datePublished":"2016-10-21T12:46:58+00:00","dateModified":"2023-03-14T07:57:11+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/"},"wordCount":311,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Sechs-Tipps-fuer-ein-sicheres-BYOD-Konzept-it-security.jpg","keywords":["Tipps und Tricks"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/","url":"https:\/\/news.save.ch\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/","name":"Six conseils pour une approche BYOD s\u00fbre - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Sechs-Tipps-fuer-ein-sicheres-BYOD-Konzept-it-security.jpg","datePublished":"2016-10-21T12:46:58+00:00","dateModified":"2023-03-14T07:57:11+00:00","breadcrumb":{"@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Sechs-Tipps-fuer-ein-sicheres-BYOD-Konzept-it-security.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Sechs-Tipps-fuer-ein-sicheres-BYOD-Konzept-it-security.jpg","width":1000,"height":667,"caption":"\u00a9 depositphotos"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Sechs Tipps f\u00fcr ein sicheres BYOD-Konzept"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Revue suisse sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sur la s\u00e9curit\u00e9","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/develop.organisator.galledia.ch"],"url":"https:\/\/news.save.ch\/fr\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/1046","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/comments?post=1046"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/1046\/revisions"}],"predecessor-version":[{"id":17562,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/1046\/revisions\/17562"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media\/1048"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media?parent=1046"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/categories?post=1046"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/tags?post=1046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}