{"id":2025,"date":"2025-08-21T14:42:38","date_gmt":"2025-08-21T18:42:38","guid":{"rendered":"https:\/\/orendasecurity.com\/services\/cloud-security-copy\/"},"modified":"2025-08-29T13:38:32","modified_gmt":"2025-08-29T17:38:32","slug":"securite-infonuagique","status":"publish","type":"page","link":"https:\/\/orendasecurity.com\/fr\/services\/securite-infonuagique\/","title":{"rendered":"S\u00e9curit\u00e9 infonuagique"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-2025\" data-postid=\"2025\" class=\"themify_builder_content themify_builder_content-2025 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_au1m370 tb_first tf_w\">\n            <span class=\"tb_row_frame_wrap tf_overflow tf_abs\" data-lazy=\"1\"><span class=\"tb_row_frame tb_row_frame_bottom  tf_abs tf_hide tf_overflow tf_w\"><\/span><\/span>            <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_vo61700 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_1 tb_235y077\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col-full tb_g72l770 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_gspl507   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h1>\u00c9valuation de la s\u00e9curit\u00e9 infonuagique<\/h1>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_1 tb_nvda707\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col-full tb_4321709 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_uhn6601   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Identification compl\u00e8te des risques : l&rsquo;\u00e9valuation de la posture de s\u00e9curit\u00e9 dans l&rsquo;infonuagique offre aux entreprises une vue d&rsquo;ensemble de leur posture de s\u00e9curit\u00e9 dans l&rsquo;infonuagique en \u00e9valuant les param\u00e8tres de configuration, les contr\u00f4les d&rsquo;acc\u00e8s et les politiques de s\u00e9curit\u00e9 pour l&rsquo;ensemble des services et ressources infonuagique. En identifiant les failles de s\u00e9curit\u00e9, les erreurs de configuration et les vuln\u00e9rabilit\u00e9s potentielles, les entreprises peuvent traiter les risques de mani\u00e8re proactive et am\u00e9liorer leur posture de s\u00e9curit\u00e9 globale dans l&rsquo;infonuagique.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_2 tb_bivo472\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_11sw472 first\">\n                    <!-- module buttons -->\n<div  class=\"module module-buttons tb_0yx7472 buttons-horizontal solid   circle\" data-lazy=\"1\">\n        <div class=\"module-buttons-item tf_in_flx\">\n                        <a href=\"\/fr\/demander-un-devis\/\" class=\"ui builder_button tf_in_flx tb_default_color\" target=\"_blank\" rel=\"noopener\">\n                                                DEMANDER UN DEVIS                                        <\/a>\n                <\/div>\n            <\/div>\n<!-- \/module buttons -->\n        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_4dqr472 last\">\n                            <\/div>\n                    <\/div>\n                <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-anchor=\"identite-infonuagique\" data-lazy=\"1\" class=\"module_row themify_builder_row tb_has_section tb_section-identite-infonuagique tb_vurl770 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_swt0707 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_67f2070 \" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                                <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                    D\u00e9couvrez des services personnalis\u00e9s con\u00e7us pour identifier les vuln\u00e9rabilit\u00e9s, renforcer les d\u00e9fenses de l'infonuagique et garantir un environnement infonuagique s\u00e9curis\u00e9 et r\u00e9silient.            <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_0qe8070   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>\u00c9valuation de l&rsquo;identit\u00e9 infonuagique<\/h2>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module text -->\n<div  class=\"module module-text tb_scd5777   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>S\u00e9curit\u00e9 renforc\u00e9e : l&rsquo;\u00e9valuation de l&rsquo;identit\u00e9 infonuagique aide les organisations \u00e0 garantir la s\u00e9curit\u00e9 de leurs syst\u00e8mes de gestion des identit\u00e9s et des acc\u00e8s (IAM) bas\u00e9s sur l&rsquo;infonuagique. En \u00e9valuant la configuration, les autorisations et les contr\u00f4les d&rsquo;acc\u00e8s au sein des plateformes d&rsquo;identit\u00e9 infonuagique, les organisations peuvent identifier les failles de s\u00e9curit\u00e9 et les vuln\u00e9rabilit\u00e9s potentielles. Cette approche proactive permet aux organisations de renforcer leur posture de s\u00e9curit\u00e9\u00a0<span style=\"font-size: 1em;\">infonuagique<\/span><span style=\"font-size: 1em;\">, d&rsquo;att\u00e9nuer le risque d&rsquo;acc\u00e8s non autoris\u00e9 et de prot\u00e9ger les donn\u00e9es sensibles stock\u00e9es dans\u00a0<\/span>l&rsquo;infonuagique<span style=\"font-size: 1em;\">.<\/span><\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-anchor=\"configuration-infonuagique\" data-lazy=\"1\" class=\"module_row themify_builder_row tb_has_section tb_section-configuration-infonuagique tb_x42l771 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_hcds007 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_j4pc700   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>\u00c9valuation de la configuration infonuagique<\/h2>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module text -->\n<div  class=\"module module-text tb_cheo777   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Am\u00e9lioration de la s\u00e9curit\u00e9 : l\u2019\u00e9valuation de la configuration de l\u2019infonuagique aide les organisations \u00e0 renforcer la s\u00e9curit\u00e9 de leur infrastructure infonuagique\u00a0en \u00e9valuant les param\u00e8tres de configuration des services et des ressources\u00a0<span style=\"font-size: 1em;\">infonuagique<\/span><span style=\"font-size: 1em;\">. En identifiant les erreurs de configuration, les contr\u00f4les d\u2019acc\u00e8s trop permissifs et d\u2019autres faiblesses en mati\u00e8re de s\u00e9curit\u00e9, les organisations peuvent traiter de mani\u00e8re proactive les vuln\u00e9rabilit\u00e9s et r\u00e9duire le risque d\u2019acc\u00e8s non autoris\u00e9s, de violations de donn\u00e9es et d\u2019autres incidents de s\u00e9curit\u00e9. Cette approche proactive renforce la s\u00e9curit\u00e9 de l&rsquo;<\/span><span style=\"font-size: 1em;\">infonuagique<\/span><span style=\"font-size: 1em;\">, att\u00e9nue les risques et prot\u00e8ge les donn\u00e9es sensibles stock\u00e9es dans l&rsquo;infonuagique.<\/span><\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-anchor=\"architecture-infonuagique\" data-lazy=\"1\" class=\"module_row themify_builder_row tb_has_section tb_section-architecture-infonuagique tb_xb8p770 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_9p62879 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_w11v007   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>\u00c9valuation de l&rsquo;architecture de s\u00e9curit\u00e9 infonuagique<\/h2>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module text -->\n<div  class=\"module module-text tb_arxa709   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Une \u00e9valuation de l&rsquo;architecture de s\u00e9curit\u00e9 infonuagique fournit une analyse compl\u00e8te de l&rsquo;infrastructure infonuagique d&rsquo;une organisation, identifiant les vuln\u00e9rabilit\u00e9s potentielles et garantissant la conformit\u00e9 aux meilleures pratiques en mati\u00e8re de s\u00e9curit\u00e9. Elle permet de d\u00e9tecter les erreurs de configuration, les risques de fuite de donn\u00e9es et les lacunes dans les contr\u00f4les d&rsquo;acc\u00e8s, pr\u00e9venant ainsi les acc\u00e8s non autoris\u00e9s et les violations potentielles. Cette \u00e9valuation garantit \u00e9galement la conformit\u00e9 aux normes r\u00e9glementaires, optimise la s\u00e9curit\u00e9 du stockage des donn\u00e9es et am\u00e9liore la gestion des identit\u00e9s et des acc\u00e8s. En fin de compte, elle renforce l&rsquo;environnement\u00a0<span style=\"font-size: 1em;\">infonuagique\u00a0<\/span><span style=\"font-size: 1em;\">de l&rsquo;organisation, r\u00e9duisant le risque de cybermenaces et favorisant une infrastructure\u00a0<\/span><span style=\"font-size: 1em;\">infonuagique<\/span><span style=\"font-size: 1em;\">\u00a0s\u00e9curis\u00e9e, \u00e9volutive et r\u00e9siliente.<\/span><\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-anchor=\"kubernetes\" data-lazy=\"1\" class=\"module_row themify_builder_row tb_has_section tb_section-kubernetes tb_na4m407 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_8b62007 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_n9ar009   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>Tests de s\u00e9curit\u00e9 des conteneurs et de Kubernetes<\/h2>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module text -->\n<div  class=\"module module-text tb_ro68700   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Identification des vuln\u00e9rabilit\u00e9s : les tests de s\u00e9curit\u00e9 des conteneurs et de Kubernetes aident les organisations \u00e0 identifier les vuln\u00e9rabilit\u00e9s et les erreurs de configuration au sein de leurs environnements conteneuris\u00e9s. En effectuant des \u00e9valuations de s\u00e9curit\u00e9, telles que l&rsquo;analyse des vuln\u00e9rabilit\u00e9s et les tests d&rsquo;intrusion, les organisations peuvent d\u00e9couvrir des risques de s\u00e9curit\u00e9 potentiels, notamment des images de conteneurs non s\u00e9curis\u00e9es, des API expos\u00e9es et des politiques de s\u00e9curit\u00e9 mal configur\u00e9es. Cette approche proactive permet aux organisations de corriger les vuln\u00e9rabilit\u00e9s avant qu&rsquo;elles ne puissent \u00eatre exploit\u00e9es par des attaquants, renfor\u00e7ant ainsi la s\u00e9curit\u00e9 globale de leurs applications conteneuris\u00e9es et de leurs clusters Kubernetes.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>\u00c9valuation de la s\u00e9curit\u00e9 infonuagique Identification compl\u00e8te des risques : l&rsquo;\u00e9valuation de la posture de s\u00e9curit\u00e9 dans l&rsquo;infonuagique offre aux entreprises une vue d&rsquo;ensemble de leur posture de s\u00e9curit\u00e9 dans l&rsquo;infonuagique en \u00e9valuant les param\u00e8tres de configuration, les contr\u00f4les d&rsquo;acc\u00e8s et les politiques de s\u00e9curit\u00e9 pour l&rsquo;ensemble des services et ressources infonuagique. En identifiant les [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":947,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-2025","page","type-page","status-publish","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curit\u00e9 infonuagique - Orenda Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/orendasecurity.com\/fr\/services\/securite-infonuagique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 infonuagique - Orenda Security\" \/>\n<meta property=\"og:description\" content=\"\u00c9valuation de la s\u00e9curit\u00e9 infonuagique Identification compl\u00e8te des risques : l&rsquo;\u00e9valuation de la posture de s\u00e9curit\u00e9 dans l&rsquo;infonuagique offre aux entreprises une vue d&rsquo;ensemble de leur posture de s\u00e9curit\u00e9 dans l&rsquo;infonuagique en \u00e9valuant les param\u00e8tres de configuration, les contr\u00f4les d&rsquo;acc\u00e8s et les politiques de s\u00e9curit\u00e9 pour l&rsquo;ensemble des services et ressources infonuagique. En identifiant les [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/orendasecurity.com\/fr\/services\/securite-infonuagique\/\" \/>\n<meta property=\"og:site_name\" content=\"Orenda Security\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-29T17:38:32+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/securite-infonuagique\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/securite-infonuagique\\\/\",\"name\":\"S\u00e9curit\u00e9 infonuagique - Orenda Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\"},\"datePublished\":\"2025-08-21T18:42:38+00:00\",\"dateModified\":\"2025-08-29T17:38:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/securite-infonuagique\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/securite-infonuagique\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/securite-infonuagique\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"S\u00e9curit\u00e9 infonuagique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"name\":\"Orenda Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/orendasecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\",\"name\":\"Orenda Security\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"width\":432,\"height\":173,\"caption\":\"Orenda Security\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 infonuagique - Orenda Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/orendasecurity.com\/fr\/services\/securite-infonuagique\/","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 infonuagique - Orenda Security","og_description":"\u00c9valuation de la s\u00e9curit\u00e9 infonuagique Identification compl\u00e8te des risques : l&rsquo;\u00e9valuation de la posture de s\u00e9curit\u00e9 dans l&rsquo;infonuagique offre aux entreprises une vue d&rsquo;ensemble de leur posture de s\u00e9curit\u00e9 dans l&rsquo;infonuagique en \u00e9valuant les param\u00e8tres de configuration, les contr\u00f4les d&rsquo;acc\u00e8s et les politiques de s\u00e9curit\u00e9 pour l&rsquo;ensemble des services et ressources infonuagique. En identifiant les [&hellip;]","og_url":"https:\/\/orendasecurity.com\/fr\/services\/securite-infonuagique\/","og_site_name":"Orenda Security","article_modified_time":"2025-08-29T17:38:32+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/orendasecurity.com\/fr\/services\/securite-infonuagique\/","url":"https:\/\/orendasecurity.com\/fr\/services\/securite-infonuagique\/","name":"S\u00e9curit\u00e9 infonuagique - Orenda Security","isPartOf":{"@id":"https:\/\/orendasecurity.com\/#website"},"datePublished":"2025-08-21T18:42:38+00:00","dateModified":"2025-08-29T17:38:32+00:00","breadcrumb":{"@id":"https:\/\/orendasecurity.com\/fr\/services\/securite-infonuagique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/orendasecurity.com\/fr\/services\/securite-infonuagique\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/orendasecurity.com\/fr\/services\/securite-infonuagique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/orendasecurity.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/orendasecurity.com\/fr\/services\/"},{"@type":"ListItem","position":3,"name":"S\u00e9curit\u00e9 infonuagique"}]},{"@type":"WebSite","@id":"https:\/\/orendasecurity.com\/#website","url":"https:\/\/orendasecurity.com\/","name":"Orenda Security","description":"","publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/orendasecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/orendasecurity.com\/#organization","name":"Orenda Security","url":"https:\/\/orendasecurity.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","width":432,"height":173,"caption":"Orenda Security"},"image":{"@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/pages\/2025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/comments?post=2025"}],"version-history":[{"count":0,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/pages\/2025\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/pages\/947"}],"wp:attachment":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/media?parent=2025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}