{"version":"1.0","provider_name":"CyberArk","provider_url":"https:\/\/www.cyberark.com\/fr\/","author_name":"Dan Zoen","author_url":"https:\/\/www.cyberark.com\/fr\/blog\/author\/dzoen\/","title":"S\u00e9curit\u00e9 op\u00e9rationnelle et Internet des objets (IoT)","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"RoKoZzQrsg\"><a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/operational-iot-security\/\">S\u00e9curit\u00e9 op\u00e9rationnelle et Internet des objets (IoT)<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberark.com\/fr\/solutions\/operational-iot-security\/embed\/#?secret=RoKoZzQrsg\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0S\u00e9curit\u00e9 op\u00e9rationnelle et Internet des objets (IoT)\u00a0\u00bb &#8212; CyberArk\" data-secret=\"RoKoZzQrsg\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberark.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"S\u00e9curisez les appareils connect\u00e9s \u00e0 l\u2019IoT et \u00e0 l\u2019OT et r\u00e9duisez le risque d\u2019attaques gr\u00e2ce \u00e0 des identifiants g\u00e9r\u00e9s de mani\u00e8re centralis\u00e9e, des mises \u00e0 niveau et des correctifs, ainsi qu\u2019un approvisionnement d\u2019acc\u00e8s externe.","thumbnail_url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/ManyDevices-Overview-Vertical-Adaptive-Multi-factor-Authentication-1.svg"}