{"id":4321,"date":"2021-06-30T16:45:26","date_gmt":"2021-06-30T16:45:26","guid":{"rendered":"https:\/\/knowhowprod.wpengine.com\/?p=4321"},"modified":"2021-10-17T17:16:03","modified_gmt":"2021-10-17T17:16:03","slug":"le-guide-ultime-pour-securiser-votre-reseau-industriel","status":"publish","type":"post","link":"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/","title":{"rendered":"Le guide ultime pour s\u00e9curiser votre r\u00e9seau industriel"},"content":{"rendered":"\n<p>Les probl\u00e8mes de cybers\u00e9curit\u00e9 deviennent une lutte quotidienne pour les entreprises industrielles. Les tendances r\u00e9centes et les statistiques sur la cybers\u00e9curit\u00e9 ont r\u00e9v\u00e9l\u00e9 une \u00e9norme augmentation des donn\u00e9es pirat\u00e9es et compromises \u00e0 partir de sources de plus en plus courantes sur le lieu de travail, comme les appareils mobiles et IdO.<br><br>L&rsquo;objectif principal de toute entreprise industrielle est d&rsquo;augmenter et de maximiser ses revenus. La solution consiste \u00e0 r\u00e9duire les co\u00fbts op\u00e9rationnels et \u00e0 accro\u00eetre l&rsquo;efficacit\u00e9 de la production. Il faut pour cela prendre des d\u00e9cisions en connaissance de cause, ce qui suppose la transmission d&rsquo;une multitude de donn\u00e9es depuis et entre des appareils intelligents et des machines communiquant efficacement au sein d&rsquo;un r\u00e9seau.<br><br>En outre, de r\u00e9centes recherches sur la s\u00e9curit\u00e9 sugg\u00e8rent que la plupart des entreprises ont des donn\u00e9es non s\u00e9curis\u00e9es et de mauvaises pratiques de cybers\u00e9curit\u00e9 en place, ce qui les rend vuln\u00e9rables \u00e0 la perte de donn\u00e9es. Pour lutter efficacement contre les intentions malveillantes, il est imp\u00e9ratif que les entreprises fassent de la sensibilisation \u00e0 la cybers\u00e9curit\u00e9, de la pr\u00e9vention et des meilleures pratiques de s\u00e9curit\u00e9 une partie de leur culture. Dans cet article, nous examinons de plus pr\u00e8s ce qui est n\u00e9cessaire pour s\u00e9curiser votre r\u00e9seau industriel et les appareils qui s&rsquo;y connectent.<\/p>\n\n\n\n<h2 id=\"vulnerabilite-accrue-aux-cyberattaques\" class=\"wp-block-heading\">Vuln\u00e9rabilit\u00e9 accrue aux cyberattaques<\/h2>\n\n\n\n<p>La connexion de dispositifs dans un r\u00e9seau automatis\u00e9 contr\u00f4l\u00e9 par des contr\u00f4leurs logique programmable (PLC), un syst\u00e8me de contr\u00f4le distribu\u00e9 (DCS) ou un syst\u00e8me de contr\u00f4le et d&rsquo;acquisition de donn\u00e9es de supervision (SCADA) n&rsquo;est pas une nouveaut\u00e9 dans le monde de l&rsquo;industrie.<br><br>Cependant, ces syst\u00e8mes technologiques op\u00e9rationnels ont traditionnellement \u00e9t\u00e9 isol\u00e9s des r\u00e9seaux d&rsquo;entreprises les plus vuln\u00e9rables. \u00c0 cause de cet isolement, les r\u00e9seaux industriels pr\u00e9sentent un faible risque de cyber-attaques et la cybers\u00e9curit\u00e9 n&rsquo;est pas une pr\u00e9occupation majeure pour les op\u00e9rateurs de syst\u00e8mes.<br><br>Les temps changent, et avec les technologies IdO qui connectent les r\u00e9seaux industriels et d&rsquo;entreprise afin de garantir un flux de donn\u00e9es continu et sans faille entre tous les appareils, la mise en \u0153uvre de mesures de cybers\u00e9curit\u00e9 pour s\u00e9curiser l&rsquo;ensemble de votre r\u00e9seau est d\u00e9sormais d&rsquo;une importance capitale.<br><br>Chaque p\u00e9riph\u00e9rique connect\u00e9 augmente la vuln\u00e9rabilit\u00e9 de votre r\u00e9seau aux cyber-attaques et un seul trou dans la cl\u00f4ture, comme un p\u00e9riph\u00e9rique obsol\u00e8te ou un commutateur non prot\u00e9g\u00e9, suffit \u00e0 un pirate avec des intentions malveillantes pour p\u00e9n\u00e9trer dans votre r\u00e9seau et commencer \u00e0 siphonner vos pr\u00e9cieuses donn\u00e9es &#8211; ou m\u00eame prendre le contr\u00f4le de l&rsquo;ensemble du processus.<\/p>\n\n\n\n<h2 id=\"trois-facteurs-importants-en-matiere-de-cybersecurite\" class=\"wp-block-heading\">Trois facteurs importants en mati\u00e8re de cybers\u00e9curit\u00e9<\/h2>\n\n\n\n<p>Nous comprenons que concevoir, mettre en \u0153uvre et renforcer la s\u00e9curit\u00e9 de vos r\u00e9seaux peut \u00eatre une t\u00e2che difficile, car il y a plusieurs aspects \u00e0 prendre en compte.<br><br>D&rsquo;un point de vue fondamental, il y a trois facteurs importants qui doivent \u00eatre pris en compte lors de la construction de votre infrastructure de cybers\u00e9curit\u00e9 :<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>S\u00e9curit\u00e9 du r\u00e9seau<\/li><li>S\u00e9curit\u00e9 des dispositifs<\/li><li>Suivi et gestion s\u00e9curis\u00e9s<\/li><\/ul>\n\n\n\n<h2 id=\"les-meilleures-pratiques-en-matiere-de-securite-des-reseaux\" class=\"wp-block-heading\">Les meilleures pratiques en mati\u00e8re de s\u00e9curit\u00e9 des r\u00e9seaux<\/h2>\n\n\n\n<p>Malgr\u00e9 les diff\u00e9rences de priorit\u00e9s et de techniques utilis\u00e9es pour prot\u00e9ger les syst\u00e8mes de contr\u00f4le industriels par rapport aux syst\u00e8mes informatiques des entreprises, plusieurs associations industrielles ont \u00e9labor\u00e9 des normes et des directives de s\u00e9curit\u00e9 pour connecter ou faire converger les SCI avec les syst\u00e8mes informatiques. &nbsp;<br><br>La s\u00e9curisation des r\u00e9seaux industriels repose sur trois piliers :<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>D\u00e9ployer une D\u00e9fense en profondeur (DeP) pour les r\u00e9seaux industriels<\/li><li>Activer les param\u00e8tres de s\u00e9curit\u00e9 sur vos r\u00e9seaux industriels<\/li><li>G\u00e9rer la s\u00e9curit\u00e9 par le biais de l&rsquo;\u00e9ducation, des politiques et du suivi<\/li><\/ul>\n\n\n\n<p>Sur la base de ces trois piliers, les meilleures pratiques suivantes sont recommand\u00e9es comme premi\u00e8re \u00e9tape pour soutenir une cyber-s\u00e9curit\u00e9 des syst\u00e8mes de contr\u00f4le industriel.<\/p>\n\n\n\n<h2 id=\"statistiques-sur-la-cybersecurite\" class=\"wp-block-heading\">Statistiques sur la cybers\u00e9curit\u00e9<\/h2>\n\n\n\n<p>Les dommages li\u00e9s \u00e0 la cybercriminalit\u00e9 devraient atteindre 6 000 milliards de dollars par an d&rsquo;ici 2021, selon&nbsp;<a href=\"http:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/\">Cybersecurity Ventures<\/a>. Pour vous donner un petit aper\u00e7u de l&rsquo;\u00e9tat actuel de la s\u00e9curit\u00e9 globale, nous avons recueilli 5 statistiques essentielles sur les violations de donn\u00e9es, le piratage, les statistiques sp\u00e9cifiques \u00e0 l&rsquo;industrie, ainsi que les d\u00e9penses et les co\u00fbts.<br><br>Les cinq statistiques cl\u00e9s<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Les d\u00e9penses mondiales en mati\u00e8re de cybers\u00e9curit\u00e9 vont atteindre 133,7 milliards de dollars en 2022. (<a href=\"http:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2018-08-15-gartner-forecasts-worldwide-information-security-spending-to-exceed-124-billion-in-2019\">Gartner<\/a>)<\/li><li>68 % des chefs d&rsquo;entreprise estiment que leurs risques en mati\u00e8re de cybers\u00e9curit\u00e9 augmentent. (<a href=\"http:\/\/enterprise.verizon.com\/en-gb\/resources\/reports\/dbir\/\">Verizon<\/a>)<\/li><li>41 % des clients cesseraient d&rsquo;acheter aupr\u00e8s d&rsquo;une entreprise victime d&rsquo;une attaque par demande de ran\u00e7on. (<a href=\"http:\/\/www.fintechnews.org\/the-2020-cybersecurity-stats-you-need-to-know\/\">Fintechnews<\/a>)<\/li><li>86% des infractions \u00e9taient motiv\u00e9es par des raisons financi\u00e8res et 25% par l&rsquo;espionnage. (<a href=\"http:\/\/enterprise.verizon.com\/en-gb\/resources\/reports\/dbir\/\">Verizon<\/a>)<\/li><li>52 % des violations concernaient le piratage, 28 % des logiciels malveillants et 32-33 % le phishing ou l&rsquo;ing\u00e9nierie sociale, respectivement. (<a href=\"http:\/\/enterprise.verizon.com\/en-gb\/resources\/reports\/dbir\/\">Verizon<\/a>)<\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"Les probl\u00e8mes de cybers\u00e9curit\u00e9 deviennent une lutte quotidienne pour les entreprises industrielles. Les tendances r\u00e9centes et les statistiques&hellip;\n","protected":false},"author":13,"featured_media":8906,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"csco_singular_sidebar":"","csco_page_header_type":"","csco_appearance_grid":"","csco_page_load_nextpost":"","csco_post_video_location":[],"csco_post_video_location_hash":"","csco_post_video_url":"","csco_post_video_bg_start_time":0,"csco_post_video_bg_end_time":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[183],"tags":[],"coauthors":[],"class_list":{"0":"post-4321","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-informatique-et-technologie-numerique","8":"cs-entry","9":"cs-video-wrap"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Le guide ultime pour s\u00e9curiser votre r\u00e9seau industriel - KnowHow<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le guide ultime pour s\u00e9curiser votre r\u00e9seau industriel - KnowHow\" \/>\n<meta property=\"og:description\" content=\"Les probl\u00e8mes de cybers\u00e9curit\u00e9 deviennent une lutte quotidienne pour les entreprises industrielles. Les tendances r\u00e9centes et les statistiques&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/\" \/>\n<meta property=\"og:site_name\" content=\"KnowHow\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-30T16:45:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-17T17:16:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ken Berkley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ken Berkley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n\t<meta name=\"twitter:label3\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data3\" content=\"Ken Berkley\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/\"},\"author\":{\"name\":\"Ken Berkley\",\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/#\/schema\/person\/03054fa7e45994b39e63e34a8d07e7f4\"},\"headline\":\"Le guide ultime pour s\u00e9curiser votre r\u00e9seau industriel\",\"datePublished\":\"2021-06-30T16:45:26+00:00\",\"dateModified\":\"2021-10-17T17:16:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/\"},\"wordCount\":886,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg\",\"articleSection\":[\"Informatique et technologie num\u00e9rique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/\",\"url\":\"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/\",\"name\":\"Le guide ultime pour s\u00e9curiser votre r\u00e9seau industriel - KnowHow\",\"isPartOf\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg\",\"datePublished\":\"2021-06-30T16:45:26+00:00\",\"dateModified\":\"2021-10-17T17:16:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/#primaryimage\",\"url\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg\",\"contentUrl\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg\",\"width\":2000,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Page d'accueil\",\"item\":\"https:\/\/knowhow.distrelec.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le guide ultime pour s\u00e9curiser votre r\u00e9seau industriel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/#website\",\"url\":\"https:\/\/knowhow.distrelec.com\/fr\/\",\"name\":\"KnowHow\",\"description\":\"KnowHow Hub\",\"publisher\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/knowhow.distrelec.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/#organization\",\"name\":\"Distrelec\",\"url\":\"https:\/\/knowhow.distrelec.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/09\/distrelec_logo.png\",\"contentUrl\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/09\/distrelec_logo.png\",\"width\":530,\"height\":98,\"caption\":\"Distrelec\"},\"image\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/#\/schema\/person\/03054fa7e45994b39e63e34a8d07e7f4\",\"name\":\"Ken Berkley\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/knowhow.distrelec.com\/fr\/#\/schema\/person\/image\/c74d33c40ed3adfd1fb8b6b8d6c5a0bd\",\"url\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/10\/cropped-Ken-Berkley-1-96x96.jpg\",\"contentUrl\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/10\/cropped-Ken-Berkley-1-96x96.jpg\",\"caption\":\"Ken Berkley\"},\"description\":\"Ken Berkley is a Results-driven SEO &amp; Content Manager here at Disterelec. With over 10 years\u2019 experience within the search industry Ken prides himself on implementing best practise and SEO techniques to improve organic ranking and visibility.\",\"sameAs\":[\"http:\/\/www.distrelec.com\",\"https:\/\/uk.linkedin.com\/in\/ken-berkley\"],\"url\":\"https:\/\/knowhow.distrelec.com\/fr\/author\/ken-berkley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le guide ultime pour s\u00e9curiser votre r\u00e9seau industriel - KnowHow","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/","og_locale":"fr_FR","og_type":"article","og_title":"Le guide ultime pour s\u00e9curiser votre r\u00e9seau industriel - KnowHow","og_description":"Les probl\u00e8mes de cybers\u00e9curit\u00e9 deviennent une lutte quotidienne pour les entreprises industrielles. Les tendances r\u00e9centes et les statistiques&hellip;","og_url":"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/","og_site_name":"KnowHow","article_published_time":"2021-06-30T16:45:26+00:00","article_modified_time":"2021-10-17T17:16:03+00:00","og_image":[{"width":2000,"height":800,"url":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg","type":"image\/jpeg"}],"author":"Ken Berkley","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Ken Berkley","Dur\u00e9e de lecture estim\u00e9e":"4 minutes","Written by":"Ken Berkley"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/#article","isPartOf":{"@id":"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/"},"author":{"name":"Ken Berkley","@id":"https:\/\/knowhow.distrelec.com\/fr\/#\/schema\/person\/03054fa7e45994b39e63e34a8d07e7f4"},"headline":"Le guide ultime pour s\u00e9curiser votre r\u00e9seau industriel","datePublished":"2021-06-30T16:45:26+00:00","dateModified":"2021-10-17T17:16:03+00:00","mainEntityOfPage":{"@id":"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/"},"wordCount":886,"commentCount":0,"publisher":{"@id":"https:\/\/knowhow.distrelec.com\/fr\/#organization"},"image":{"@id":"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/#primaryimage"},"thumbnailUrl":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg","articleSection":["Informatique et technologie num\u00e9rique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/","url":"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/","name":"Le guide ultime pour s\u00e9curiser votre r\u00e9seau industriel - KnowHow","isPartOf":{"@id":"https:\/\/knowhow.distrelec.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/#primaryimage"},"image":{"@id":"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/#primaryimage"},"thumbnailUrl":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg","datePublished":"2021-06-30T16:45:26+00:00","dateModified":"2021-10-17T17:16:03+00:00","breadcrumb":{"@id":"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/#primaryimage","url":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg","contentUrl":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg","width":2000,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/knowhow.distrelec.com\/fr\/informatique-et-technologie-numerique\/le-guide-ultime-pour-securiser-votre-reseau-industriel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Page d'accueil","item":"https:\/\/knowhow.distrelec.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Le guide ultime pour s\u00e9curiser votre r\u00e9seau industriel"}]},{"@type":"WebSite","@id":"https:\/\/knowhow.distrelec.com\/fr\/#website","url":"https:\/\/knowhow.distrelec.com\/fr\/","name":"KnowHow","description":"KnowHow Hub","publisher":{"@id":"https:\/\/knowhow.distrelec.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/knowhow.distrelec.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/knowhow.distrelec.com\/fr\/#organization","name":"Distrelec","url":"https:\/\/knowhow.distrelec.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/knowhow.distrelec.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/09\/distrelec_logo.png","contentUrl":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/09\/distrelec_logo.png","width":530,"height":98,"caption":"Distrelec"},"image":{"@id":"https:\/\/knowhow.distrelec.com\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/knowhow.distrelec.com\/fr\/#\/schema\/person\/03054fa7e45994b39e63e34a8d07e7f4","name":"Ken Berkley","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/knowhow.distrelec.com\/fr\/#\/schema\/person\/image\/c74d33c40ed3adfd1fb8b6b8d6c5a0bd","url":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/10\/cropped-Ken-Berkley-1-96x96.jpg","contentUrl":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/10\/cropped-Ken-Berkley-1-96x96.jpg","caption":"Ken Berkley"},"description":"Ken Berkley is a Results-driven SEO &amp; Content Manager here at Disterelec. With over 10 years\u2019 experience within the search industry Ken prides himself on implementing best practise and SEO techniques to improve organic ranking and visibility.","sameAs":["http:\/\/www.distrelec.com","https:\/\/uk.linkedin.com\/in\/ken-berkley"],"url":"https:\/\/knowhow.distrelec.com\/fr\/author\/ken-berkley\/"}]}},"jetpack_featured_media_url":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/knowhow.distrelec.com\/fr\/wp-json\/wp\/v2\/posts\/4321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowhow.distrelec.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowhow.distrelec.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/fr\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/fr\/wp-json\/wp\/v2\/comments?post=4321"}],"version-history":[{"count":0,"href":"https:\/\/knowhow.distrelec.com\/fr\/wp-json\/wp\/v2\/posts\/4321\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/fr\/wp-json\/wp\/v2\/media\/8906"}],"wp:attachment":[{"href":"https:\/\/knowhow.distrelec.com\/fr\/wp-json\/wp\/v2\/media?parent=4321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/fr\/wp-json\/wp\/v2\/categories?post=4321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/fr\/wp-json\/wp\/v2\/tags?post=4321"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/fr\/wp-json\/wp\/v2\/coauthors?post=4321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}