{"version":"1.0","provider_name":"CyberArk","provider_url":"https:\/\/www.cyberark.com\/fr\/","author_name":"Fernanda Walker","author_url":"https:\/\/www.cyberark.com\/fr\/blog\/author\/fwalker\/","title":"Protection contre les ran\u00e7ongiciels","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"vCElbWyI0v\"><a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/ransomware-protection\/\">Protection contre les ran\u00e7ongiciels<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberark.com\/fr\/solutions\/ransomware-protection\/embed\/#?secret=vCElbWyI0v\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Protection contre les ran\u00e7ongiciels\u00a0\u00bb &#8212; CyberArk\" data-secret=\"vCElbWyI0v\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberark.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"B\u00e9n\u00e9ficiez d\u2019une protection globale contre les ran\u00e7ongiciels gr\u00e2ce \u00e0 l\u2019approche de s\u00e9curit\u00e9 des points de terminaison et \u00e0 l\u2019\u00e9l\u00e9vation juste \u00e0 temps des acc\u00e8s \u00e0 privil\u00e8ges pour les applications et les syst\u00e8mes afin de pr\u00e9venir les attaques."}