{"id":2016,"date":"2021-12-07T16:07:10","date_gmt":"2021-12-07T15:07:10","guid":{"rendered":"https:\/\/www.solutions-exchange.fr\/?page_id=2016"},"modified":"2022-02-08T17:02:56","modified_gmt":"2022-02-08T16:02:56","slug":"video-webinar-detecter-et-se-proteger-des-vulnerabilites","status":"publish","type":"page","link":"https:\/\/www.solutions-exchange.fr\/index.php\/video-webinar-detecter-et-se-proteger-des-vulnerabilites\/","title":{"rendered":"video webinar d\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s"},"content":{"rendered":"<p>[vc_row height_ratio=\u00a0\u00bb40&Prime; rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb191&Prime;][vc_column]<div class=\"eut-empty-space\" style=\"height: 50px;\"><\/div>[vc_column_text]<\/p>\n<h3><span style=\"color: #ffffff;\">D\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s<\/span><\/h3>\n<p>[\/vc_column_text]<div class=\"eut-empty-space\" style=\"height: 50px;\"><\/div>[\/vc_column][\/vc_row][vc_row][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text]Retrouvez notre webinar sur comment d\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s.<\/p>\n<p>Agenda<\/p>\n<p>D\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s.<\/p>\n<p>G\u00e9rer les correctifs sur les machines et supprimer les logiciels dangereux<\/p>\n<p>Identifier les risques r\u00e9els parmi une multitude de vuln\u00e9rabilit\u00e9s<\/p>\n<p>Optimiser la configuration de vos machines et prot\u00e9ger vos serveurs web<\/p>\n<p>Faciliter le d\u00e9ploiement des correctifs.<\/p>\n<p>Questions \/ R\u00e9ponses.[\/vc_column_text]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div><div class=\"eut-element eut-video\" style=\"\"><iframe loading=\"lazy\" title=\"D\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s\" width=\"1080\" height=\"608\" src=\"https:\/\/www.youtube.com\/embed\/MdacS6_Hn4I?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"eut-empty-space\" style=\"height: 50px;\"><\/div>[\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row height_ratio=\u00a0\u00bb40&Prime; rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb191&Prime;][vc_column][vc_column_text] D\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text]Retrouvez notre webinar sur comment d\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s. Agenda D\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s. G\u00e9rer les correctifs sur les machines et supprimer les logiciels dangereux Identifier les risques r\u00e9els parmi une multitude de vuln\u00e9rabilit\u00e9s Optimiser la configuration de vos machines [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-2016","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>video webinar d\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s - Solutions Exchange<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.solutions-exchange.fr\/index.php\/video-webinar-detecter-et-se-proteger-des-vulnerabilites\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"video webinar d\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s - Solutions Exchange\" \/>\n<meta property=\"og:description\" content=\"[vc_row height_ratio=\u00a0\u00bb40&Prime; rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb191&Prime;][vc_column][vc_column_text] D\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text]Retrouvez notre webinar sur comment d\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s. Agenda D\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s. G\u00e9rer les correctifs sur les machines et supprimer les logiciels dangereux Identifier les risques r\u00e9els parmi une multitude de vuln\u00e9rabilit\u00e9s Optimiser la configuration de vos machines [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.solutions-exchange.fr\/index.php\/video-webinar-detecter-et-se-proteger-des-vulnerabilites\/\" \/>\n<meta property=\"og:site_name\" content=\"Solutions Exchange\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-08T16:02:56+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/video-webinar-detecter-et-se-proteger-des-vulnerabilites\\\/\",\"url\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/video-webinar-detecter-et-se-proteger-des-vulnerabilites\\\/\",\"name\":\"video webinar d\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s - Solutions Exchange\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/#website\"},\"datePublished\":\"2021-12-07T15:07:10+00:00\",\"dateModified\":\"2022-02-08T16:02:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/video-webinar-detecter-et-se-proteger-des-vulnerabilites\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/video-webinar-detecter-et-se-proteger-des-vulnerabilites\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/video-webinar-detecter-et-se-proteger-des-vulnerabilites\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"video webinar d\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/#website\",\"url\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/\",\"name\":\"Solutions Exchange\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"video webinar d\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s - Solutions Exchange","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.solutions-exchange.fr\/index.php\/video-webinar-detecter-et-se-proteger-des-vulnerabilites\/","og_locale":"fr_FR","og_type":"article","og_title":"video webinar d\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s - Solutions Exchange","og_description":"[vc_row height_ratio=\u00a0\u00bb40&Prime; rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb191&Prime;][vc_column][vc_column_text] D\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text]Retrouvez notre webinar sur comment d\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s. Agenda D\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s. G\u00e9rer les correctifs sur les machines et supprimer les logiciels dangereux Identifier les risques r\u00e9els parmi une multitude de vuln\u00e9rabilit\u00e9s Optimiser la configuration de vos machines [&hellip;]","og_url":"https:\/\/www.solutions-exchange.fr\/index.php\/video-webinar-detecter-et-se-proteger-des-vulnerabilites\/","og_site_name":"Solutions Exchange","article_modified_time":"2022-02-08T16:02:56+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.solutions-exchange.fr\/index.php\/video-webinar-detecter-et-se-proteger-des-vulnerabilites\/","url":"https:\/\/www.solutions-exchange.fr\/index.php\/video-webinar-detecter-et-se-proteger-des-vulnerabilites\/","name":"video webinar d\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s - Solutions Exchange","isPartOf":{"@id":"https:\/\/www.solutions-exchange.fr\/#website"},"datePublished":"2021-12-07T15:07:10+00:00","dateModified":"2022-02-08T16:02:56+00:00","breadcrumb":{"@id":"https:\/\/www.solutions-exchange.fr\/index.php\/video-webinar-detecter-et-se-proteger-des-vulnerabilites\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.solutions-exchange.fr\/index.php\/video-webinar-detecter-et-se-proteger-des-vulnerabilites\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.solutions-exchange.fr\/index.php\/video-webinar-detecter-et-se-proteger-des-vulnerabilites\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.solutions-exchange.fr\/"},{"@type":"ListItem","position":2,"name":"video webinar d\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s"}]},{"@type":"WebSite","@id":"https:\/\/www.solutions-exchange.fr\/#website","url":"https:\/\/www.solutions-exchange.fr\/","name":"Solutions Exchange","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.solutions-exchange.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"zuperla-eutf-large-rect-horizontal":false,"zuperla-eutf-small-square":false,"zuperla-eutf-small-rect-horizontal":false,"zuperla-eutf-small-rect-vertical":false,"zuperla-eutf-medium-square":false,"zuperla-eutf-medium-rect-horizontal":false,"zuperla-eutf-medium-rect-vertical":false,"zuperla-eutf-fullscreen":false},"uagb_author_info":{"display_name":"admin6583","author_link":"https:\/\/www.solutions-exchange.fr\/index.php\/author\/admin6583\/"},"uagb_comment_info":0,"uagb_excerpt":"[vc_row height_ratio=\u00a0\u00bb40&Prime; rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb191&Prime;][vc_column][vc_column_text] D\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text]Retrouvez notre webinar sur comment d\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s. Agenda D\u00e9tecter et se prot\u00e9ger des vuln\u00e9rabilit\u00e9s. G\u00e9rer les correctifs sur les machines et supprimer les logiciels dangereux Identifier les risques r\u00e9els parmi une multitude de vuln\u00e9rabilit\u00e9s Optimiser la configuration de vos machines\u2026","_links":{"self":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/pages\/2016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/comments?post=2016"}],"version-history":[{"count":9,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/pages\/2016\/revisions"}],"predecessor-version":[{"id":2273,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/pages\/2016\/revisions\/2273"}],"wp:attachment":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/media?parent=2016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}