{"id":5162,"date":"2017-08-04T14:03:37","date_gmt":"2017-08-04T12:03:37","guid":{"rendered":"https:\/\/news.save.ch\/?p=5162"},"modified":"2023-03-14T09:00:01","modified_gmt":"2023-03-14T08:00:01","slug":"zutrittskontrolle-vertrauenswuerdige-identitaeten","status":null,"type":"post","link":"https:\/\/news.save.ch\/fr\/zutrittskontrolle-vertrauenswuerdige-identitaeten\/","title":{"rendered":"Contr\u00f4le d'acc\u00e8s - identit\u00e9s de confiance"},"content":{"rendered":"<figure id=\"attachment_5163\" aria-describedby=\"caption-attachment-5163\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5163\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_25081731_m-2015.jpg\" alt=\"\" width=\"680\" height=\"454\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_25081731_m-2015.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_25081731_m-2015-375x250.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-5163\" class=\"wp-caption-text\">depositphotos<\/figcaption><\/figure>\n<p>Au centre de la conf\u00e9rence parrain\u00e9e par HID Global <a href=\"https:\/\/www.ifsecglobal.com\/access-control-connected-workplace-2017\">Enqu\u00eate<\/a> d'IFSEC Global, les possibilit\u00e9s et les avantages qu'offre une infrastructure de contr\u00f4le d'acc\u00e8s combin\u00e9e \u00e0 des identit\u00e9s fiables pour l'interconnexion de syst\u00e8mes tr\u00e8s divers. Selon l'\u00e9tude, 85% des personnes interrog\u00e9es savent que les identit\u00e9s peuvent \u00eatre utilis\u00e9es \u00e0 travers diff\u00e9rents syst\u00e8mes et appareils. Plus de 60% pensent \u00e9galement que l'utilisation d'une seule carte d'identit\u00e9 ou d'un seul appareil mobile am\u00e9liore l'efficacit\u00e9 op\u00e9rationnelle. En outre, 60% des personnes interrog\u00e9es ont d\u00e9j\u00e0 reli\u00e9 les syst\u00e8mes de contr\u00f4le d'acc\u00e8s \u00e0 d'autres syst\u00e8mes de gestion des b\u00e2timents.<\/p>\n<p>Autres r\u00e9sultats importants en bref :<\/p>\n<ul>\n<li>63% consid\u00e8rent que leur b\u00e2timent est au moins partiellement \"intelligent\", soit une augmentation de 13 points de pourcentage par rapport \u00e0 l'enqu\u00eate mondiale de l'IFSEC sur les b\u00e2timents intelligents de 2016.<\/li>\n<li>51% des personnes interrog\u00e9es ont int\u00e9gr\u00e9 des syst\u00e8mes de gestion du temps dans d'autres syst\u00e8mes de gestion de b\u00e2timents<\/li>\n<li>45% consid\u00e8rent que le suivi des actifs est le domaine le plus susceptible d'\u00eatre reli\u00e9 \u00e0 d'autres syst\u00e8mes dans un avenir proche.<\/li>\n<li>les principaux moteurs de la mise \u00e0 niveau des syst\u00e8mes de contr\u00f4le d'acc\u00e8s sont l'am\u00e9lioration de la s\u00e9curit\u00e9 (65%), l'authentification multifactorielle (46%) et la prise en charge de diff\u00e9rents facteurs de forme d'identification, tels que les appareils mobiles et les cartes (41%)<\/li>\n<li>deux tiers des personnes interrog\u00e9es estiment que les \u00e9quipes de gestion de l'informatique, des installations et de la s\u00e9curit\u00e9 devraient collaborer plus \u00e9troitement lors de l'achat, de l'installation et de l'exploitation de nouvelles technologies.<\/li>\n<\/ul>\n<p><strong>L'importance de l'IoT augmente<\/strong><\/p>\n<p>Enfin, l'enqu\u00eate indique \u00e9galement que l'importance de l'Internet des objets (IdO) va augmenter. En effet, 86% confirment qu'ils ont des connaissances sur l'IdO, ses avantages et ses risques. Dans la perspective d'un lieu de travail de plus en plus connect\u00e9, les identit\u00e9s de confiance peuvent aider les entreprises \u00e0 poursuivre l'int\u00e9gration des syst\u00e8mes de b\u00e2timent avec des applications IdO s\u00e9curis\u00e9es et optimis\u00e9es qui permettent de connecter les personnes, les lieux et les objets.<\/p>\n<p><strong>Une int\u00e9gration sans faille est souhaitable<\/strong><\/p>\n<p>\"La plupart des personnes interrog\u00e9es souhaitent une int\u00e9gration plus forte et plus transparente entre les applications de construction intelligente et les applications commerciales. De nombreuses entreprises la r\u00e9alisent en utilisant un cadre de gestion commun avec des bases de donn\u00e9es centralis\u00e9es. Mais cette approche est g\u00e9n\u00e9ralement tr\u00e8s co\u00fbteuse\", explique Ashish Malpani de HID Global. \"L'\u00e9tude montre que les identit\u00e9s de confiance peuvent \u00eatre une alternative r\u00e9alisable pour la construction d'un b\u00e2timent en r\u00e9seau, avec des co\u00fbts r\u00e9duits, un meilleur retour sur investissement et une exp\u00e9rience utilisateur optimis\u00e9e. Pour cela, il suffit que tous les syst\u00e8mes soient con\u00e7us pour la v\u00e9rification d'identit\u00e9 et l'autorisation, de sorte qu'une seule identit\u00e9 permette d'acc\u00e9der aux ascenseurs, aux parkings, aux distributeurs automatiques ou aux imprimantes\".<\/p>\n<p><em>Pour le rapport \"Access control in the connected workplace : The benefits and barriers to enhancing convenience and compliance in connected buildings\", IFSEC Global a interrog\u00e9 plusieurs centaines de responsables de la s\u00e9curit\u00e9 et de facility managers dans plus de 50 pays du monde entier.<\/em><\/p>\n<p><em>Source : HID Global<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Im Mittelpunkt der von HID Global gesponsorten Untersuchung von IFSEC Global stehen die M\u00f6glichkeiten und Vorteile, die eine Zutrittskontrollinfrastruktur in Kombination mit vertrauensw\u00fcrdigen Identit\u00e4ten f\u00fcr die Vernetzung unterschiedlichster Systeme bietet. Gem\u00e4ss der Studie wissen 85% der Befragten, dass Identit\u00e4ten \u00fcber verschiedene Systeme und Ger\u00e4te hinweg verwendet werden k\u00f6nnen. Mehr als 60% glauben zudem, dass hierbei [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":5163,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3312],"tags":[158,91],"class_list":["post-5162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sicherheit","tag-zutrittskontrolle","tag-zutrittsysteme"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"3303","_yoast_wpseo_focuskw_text_input":"HID","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zutrittskontrolle - vertrauensw\u00fcrdige Identit\u00e4ten - Save<\/title>\n<meta name=\"description\" content=\"Vertrauensw\u00fcrdige Identit\u00e4ten schlagen Br\u00fccke zwischen Connected Workplaces und Smart Buildings, wie aus einer Studie hervorgeht.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/fr\/zutrittskontrolle-vertrauenswuerdige-identitaeten\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zutrittskontrolle - vertrauensw\u00fcrdige Identit\u00e4ten - Save\" \/>\n<meta property=\"og:description\" content=\"Vertrauensw\u00fcrdige Identit\u00e4ten schlagen Br\u00fccke zwischen Connected Workplaces und Smart Buildings, wie aus einer Studie hervorgeht.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/fr\/zutrittskontrolle-vertrauenswuerdige-identitaeten\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-04T12:03:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T08:00:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_25081731_m-2015.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/zutrittskontrolle-vertrauenswuerdige-identitaeten\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/zutrittskontrolle-vertrauenswuerdige-identitaeten\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Zutrittskontrolle &#8211; vertrauensw\u00fcrdige Identit\u00e4ten\",\"datePublished\":\"2017-08-04T12:03:37+00:00\",\"dateModified\":\"2023-03-14T08:00:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/zutrittskontrolle-vertrauenswuerdige-identitaeten\\\/\"},\"wordCount\":437,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/zutrittskontrolle-vertrauenswuerdige-identitaeten\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/Depositphotos_25081731_m-2015.jpg\",\"keywords\":[\"Zutrittskontrolle\",\"Zutrittsysteme\"],\"articleSection\":[\"SICHERHEIT\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/zutrittskontrolle-vertrauenswuerdige-identitaeten\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/zutrittskontrolle-vertrauenswuerdige-identitaeten\\\/\",\"name\":\"Zutrittskontrolle - vertrauensw\u00fcrdige Identit\u00e4ten - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/zutrittskontrolle-vertrauenswuerdige-identitaeten\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/zutrittskontrolle-vertrauenswuerdige-identitaeten\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/Depositphotos_25081731_m-2015.jpg\",\"datePublished\":\"2017-08-04T12:03:37+00:00\",\"dateModified\":\"2023-03-14T08:00:01+00:00\",\"description\":\"Vertrauensw\u00fcrdige Identit\u00e4ten schlagen Br\u00fccke zwischen Connected Workplaces und Smart Buildings, wie aus einer Studie hervorgeht.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/zutrittskontrolle-vertrauenswuerdige-identitaeten\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/zutrittskontrolle-vertrauenswuerdige-identitaeten\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/zutrittskontrolle-vertrauenswuerdige-identitaeten\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/Depositphotos_25081731_m-2015.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/Depositphotos_25081731_m-2015.jpg\",\"width\":1000,\"height\":667,\"caption\":\"depositphotos\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/zutrittskontrolle-vertrauenswuerdige-identitaeten\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zutrittskontrolle &#8211; vertrauensw\u00fcrdige Identit\u00e4ten\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/fr\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Contr\u00f4le d'acc\u00e8s - identit\u00e9s de confiance - Save","description":"Les identit\u00e9s de confiance jettent un pont entre les lieux de travail connect\u00e9s et les b\u00e2timents intelligents, comme le montre une \u00e9tude.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/fr\/zutrittskontrolle-vertrauenswuerdige-identitaeten\/","og_locale":"fr_FR","og_type":"article","og_title":"Zutrittskontrolle - vertrauensw\u00fcrdige Identit\u00e4ten - Save","og_description":"Vertrauensw\u00fcrdige Identit\u00e4ten schlagen Br\u00fccke zwischen Connected Workplaces und Smart Buildings, wie aus einer Studie hervorgeht.","og_url":"https:\/\/news.save.ch\/fr\/zutrittskontrolle-vertrauenswuerdige-identitaeten\/","og_site_name":"Save","article_published_time":"2017-08-04T12:03:37+00:00","article_modified_time":"2023-03-14T08:00:01+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_25081731_m-2015.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Roger Str\u00e4ssle","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/zutrittskontrolle-vertrauenswuerdige-identitaeten\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/zutrittskontrolle-vertrauenswuerdige-identitaeten\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Zutrittskontrolle &#8211; vertrauensw\u00fcrdige Identit\u00e4ten","datePublished":"2017-08-04T12:03:37+00:00","dateModified":"2023-03-14T08:00:01+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/zutrittskontrolle-vertrauenswuerdige-identitaeten\/"},"wordCount":437,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/zutrittskontrolle-vertrauenswuerdige-identitaeten\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_25081731_m-2015.jpg","keywords":["Zutrittskontrolle","Zutrittsysteme"],"articleSection":["SICHERHEIT"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/zutrittskontrolle-vertrauenswuerdige-identitaeten\/","url":"https:\/\/news.save.ch\/zutrittskontrolle-vertrauenswuerdige-identitaeten\/","name":"Contr\u00f4le d'acc\u00e8s - identit\u00e9s de confiance - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/zutrittskontrolle-vertrauenswuerdige-identitaeten\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/zutrittskontrolle-vertrauenswuerdige-identitaeten\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_25081731_m-2015.jpg","datePublished":"2017-08-04T12:03:37+00:00","dateModified":"2023-03-14T08:00:01+00:00","description":"Les identit\u00e9s de confiance jettent un pont entre les lieux de travail connect\u00e9s et les b\u00e2timents intelligents, comme le montre une \u00e9tude.","breadcrumb":{"@id":"https:\/\/news.save.ch\/zutrittskontrolle-vertrauenswuerdige-identitaeten\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/zutrittskontrolle-vertrauenswuerdige-identitaeten\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/zutrittskontrolle-vertrauenswuerdige-identitaeten\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_25081731_m-2015.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_25081731_m-2015.jpg","width":1000,"height":667,"caption":"depositphotos"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/zutrittskontrolle-vertrauenswuerdige-identitaeten\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Zutrittskontrolle &#8211; vertrauensw\u00fcrdige Identit\u00e4ten"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Revue suisse sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sur la s\u00e9curit\u00e9","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/fr\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/5162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/comments?post=5162"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/5162\/revisions"}],"predecessor-version":[{"id":17992,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/5162\/revisions\/17992"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media\/5163"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media?parent=5162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/categories?post=5162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/tags?post=5162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}