{"id":71697,"date":"2025-04-17T13:57:02","date_gmt":"2025-04-17T12:57:02","guid":{"rendered":"https:\/\/www.wallix.com\/barriers-to-zero-trust-implementation-in-ot-environments\/"},"modified":"2025-05-05T15:23:35","modified_gmt":"2025-05-05T14:23:35","slug":"challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/","title":{"rendered":"Challenges et d\u00e9fis de la mise en \u0153uvre du Zero Trust dans un environnement OT"},"content":{"rendered":"<div class='flex_column_table av-m4gycypq-0d87fe654fe971f4beb72ce383dbc061 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4gycypq-0d87fe654fe971f4beb72ce383dbc061\">\n#top .flex_column_table.av-equal-height-column-flextable.av-m4gycypq-0d87fe654fe971f4beb72ce383dbc061{\nmargin-top:0px;\nmargin-bottom:0;\n}\n.flex_column.av-m4gycypq-0d87fe654fe971f4beb72ce383dbc061{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-m4gycypq-0d87fe654fe971f4beb72ce383dbc061{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-m4gycypq-0d87fe654fe971f4beb72ce383dbc061 av_two_third  avia-builder-el-0  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4ngblz0-efc86790eff66a593c8bfa538b630db6\">\n#top .av-special-heading.av-4ngblz0-efc86790eff66a593c8bfa538b630db6{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-4ngblz0-efc86790eff66a593c8bfa538b630db6 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-4ngblz0-efc86790eff66a593c8bfa538b630db6 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-4ngblz0-efc86790eff66a593c8bfa538b630db6 av-special-heading-h1 blockquote modern-quote  avia-builder-el-1  el_before_av_post_metadata  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  > Les challenges et d\u00e9fis de la mise en \u0153uvre du Zero Trust dans les environnements OT<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<div  class='av-post-metadata-container av-av_post_metadata-49bdcd90f745f6e4014ebc01f842bc12 av-metadata-container-align-left  avia-builder-el-2  el_after_av_heading  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\">by<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/author\/admin\/\"  rel=\"author\">admin<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-post-metadata-modified-date\" >5 Mai 2025<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-category\"><span class=\"av-metadata-before av-metadata-before-categories\">in<\/span><span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/\" >BLOGPOST<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/industrie-fr\/\" >INDUSTRIE<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/ot-fr\/\" >OT<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/ot-blogpost-fr\/\" >OT BLOGPOST<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/blog-protocoles-industriels\/\" >PROTOCOLES INDUSTRIELS<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/zero-trust-blogpost-fr\/\" >ZERO TRUST<\/a><\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-tba48s-ac6139dc4f46ad806cff3724c5b41f42 hr-default  avia-builder-el-3  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-m4gydqi6-4bc848cee03c0267484099e0a7c65918 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Le Zero Trust s&rsquo;est impos\u00e9 comme l&rsquo;approche de s\u00e9curit\u00e9 de r\u00e9f\u00e9rence pour la protection des actifs num\u00e9riques. Le principe simple \u00ab\u00a0ne jamais faire confiance, toujours v\u00e9rifier\u00a0\u00bb marque une rupture avec les mod\u00e8les traditionnels de s\u00e9curit\u00e9 p\u00e9rim\u00e9trique. Toutefois, dans le domaine de l&rsquo;OT, le d\u00e9ploiement du Zero Trust se heurte \u00e0 une s\u00e9rie de contraintes qu\u2019il faut prendre en compte.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3459 aligncenter\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2019\/11\/industrial-robot-iiot1-e1726042825617.jpg\" alt=\"\" width=\"626\" height=\"417\" \/><\/p>\n<h2>L&rsquo;h\u00e9ritage technologique comme contrainte majeure<\/h2>\n<p>Les environnements OT \u00e9chappent aux cycles de renouvellement classiques de l&rsquo;IT d&rsquo;entreprise. Dans une centrale \u00e9lectrique typique, on trouve couramment des PLC datant des ann\u00e9es 1990 qui pilotent encore des processus critiques. Ces \u00e9quipements sont ant\u00e9rieurs aux paradigmes modernes de cybers\u00e9curit\u00e9 : absence de m\u00e9canismes d&rsquo;authentification natifs et conception incompatible avec la micro-segmentation. Ils appartiennent \u00e0 une \u00e9poque o\u00f9 l\u2019isolation physique du mat\u00e9riel constituait le principal rempart de s\u00e9curit\u00e9.<\/p>\n<p>La situation pour de nombreux sites industriels est sans \u00e9quivoque : leurs processus critiques d\u00e9pendent de contr\u00f4leurs d\u00e9ploy\u00e9s il y a plusieurs d\u00e9cennies. Le remplacement de ces syst\u00e8mes impliquerait des interruptions de production dont le co\u00fbt est rarement justifiable d&rsquo;un point de vue business. Cette r\u00e9alit\u00e9 constitue un obstacle fondamental au d\u00e9ploiement d&rsquo;architectures Zero Trust, qui pr\u00e9supposent g\u00e9n\u00e9ralement des capacit\u00e9s techniques modernes, notamment en mati\u00e8re d&rsquo;authentification et de contr\u00f4les d&rsquo;acc\u00e8s granulaires.<\/p>\n<h2>La disponibilit\u00e9 comme imp\u00e9ratif cat\u00e9gorique<\/h2>\n<p>Si les d\u00e9partements IT \u00e9quilibrent traditionnellement la triade CIA (confidentialit\u00e9, int\u00e9grit\u00e9, disponibilit\u00e9) selon les besoins m\u00e9tiers, l&rsquo;OT inverse compl\u00e8tement cette hi\u00e9rarchie. Une seule minute d&rsquo;indisponibilit\u00e9 dans une usine, un r\u00e9seau \u00e9lectrique ou une installation hydraulique entra\u00eene imm\u00e9diatement des cons\u00e9quences physiques concr\u00e8tes : production perdue, incidents de s\u00e9curit\u00e9 industrielle, voire impacts critiques sur la s\u00e9curit\u00e9 des personnes et la continuit\u00e9 d&rsquo;activit\u00e9.<\/p>\n<p>Face aux propositions des RSSI, les \u00e9quipes op\u00e9rationnelles questionnent syst\u00e9matiquement l&rsquo;impact potentiel sur la disponibilit\u00e9 des machines. Avec les solutions Zero Trust, garantir une impl\u00e9mentation sans perturbation reste complexe, notamment dans des environnements o\u00f9 une disponibilit\u00e9 de 99,999% constitue le standard d\u2019exigence. Cette tension g\u00e9n\u00e8re une r\u00e9sistance significative envers tout changement per\u00e7u comme potentiellement disruptif et risqu\u00e9 pour les processus de production.<\/p>\n<h2>La probl\u00e9matique des protocoles industriels<\/h2>\n<p>Les architectures Zero Trust modernes s&rsquo;appuient sur l&rsquo;authentification s\u00e9curis\u00e9e, les communications chiffr\u00e9es et l&rsquo;Identity management. En parall\u00e8le, les environnements de production fonctionnent avec Modbus, PROFINET et d&rsquo;autres protocoles industriels con\u00e7us il y a des d\u00e9cennies pour leur fiabilit\u00e9, non pour leur s\u00e9curit\u00e9. Ces protocoles fondamentaux ne disposent pas des constructions s\u00e9curitaires \u00e9l\u00e9mentaires n\u00e9cessaires \u00e0 l&rsquo;impl\u00e9mentation du Zero Trust.<\/p>\n<p>L&rsquo;int\u00e9gration de m\u00e9canismes d&rsquo;authentification dans ces protocoles implique le d\u00e9ploiement de passerelles ou proxys qui introduisent de nouveaux points de d\u00e9faillance potentiels et des probl\u00e9matiques de performance. La majorit\u00e9 des ing\u00e9nieurs d&rsquo;usine pr\u00e9f\u00e8rent \u00e9viter ces risques. Les limitations intrins\u00e8ques de ces protocoles constituent des obstacles techniques majeurs qui n\u00e9cessitent des modifications architecturales substantielles, auxquelles la plupart des organisations sont r\u00e9ticentes.<\/p>\n<h2>Le d\u00e9fi persistant de la visibilit\u00e9<\/h2>\n<p>On ne peut s\u00e9curiser ce qu&rsquo;on ne voit pas. Le Zero Trust commence par une cartographie exhaustive de tous les actifs et flux r\u00e9seau. Pourtant, les organisations industrielles peinent souvent \u00e0 maintenir un inventaire fiable. Des d\u00e9pendances non document\u00e9es, des modifications sauvages et l&rsquo;h\u00e9t\u00e9rog\u00e9n\u00e9it\u00e9 des \u00e9quipements transforment cette t\u00e2che en d\u00e9fi cons\u00e9quent.<\/p>\n<p>Les audits r\u00e9seau r\u00e9v\u00e8lent fr\u00e9quemment des surprises significatives : \u00e9quipements communiquant via des canaux non r\u00e9f\u00e9renc\u00e9s, shadow IT industriel et cartographies r\u00e9seau lacunaires. Ces d\u00e9couvertes compliquent consid\u00e9rablement la planification du zonage Zero Trust. Les organisations r\u00e9alisent que leur visibilit\u00e9 sur les communications OT est bien moins compl\u00e8te qu&rsquo;initialement estim\u00e9. Or, cette probl\u00e9matique de visibilit\u00e9 retarde souvent les calendriers d&rsquo;impl\u00e9mentation, les entreprises devant d&rsquo;abord combler ces lacunes fondamentales.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-mab25zdy-ffa68555d963cb68edab942116f3dfe5\">\n.avia-image-container.av-mab25zdy-ffa68555d963cb68edab942116f3dfe5 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-mab25zdy-ffa68555d963cb68edab942116f3dfe5 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-mab25zdy-ffa68555d963cb68edab942116f3dfe5 av-styling- av-img-linked avia-align-center  avia-builder-el-5  el_after_av_textblock  el_before_av_button '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><a href=\"https:\/\/attendee.gotowebinar.com\/register\/1877672736997781086?source=website\" class='avia_image '  target=\"_blank\"  rel=\"noopener noreferrer\" aria-label='Webinar OT DAVID ET GWENDAL (8)'><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-72235 avia-img-lazy-loading-not-72235 avia_image ' src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/04\/Webinar-OT-DAVID-ET-GWENDAL-8.png\" alt='A sleek webinar banner titled \u201cImplementing Zero Trust for OT \u2013 Critical Obstacles and Best Practice\u201d, featuring portraits of key speakers and a timeline detail. This image highlights WALLIX\u2019s expertise in guiding industrial and operational technology teams toward Zero\u202fTrust security strategies for privileged access.' title='Webinar OT DAVID ET GWENDAL (8)'  height=\"300\" width=\"1200\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/04\/Webinar-OT-DAVID-ET-GWENDAL-8.png 1200w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/04\/Webinar-OT-DAVID-ET-GWENDAL-8-300x75.png 300w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/04\/Webinar-OT-DAVID-ET-GWENDAL-8-1030x258.png 1030w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/04\/Webinar-OT-DAVID-ET-GWENDAL-8-768x192.png 768w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/04\/Webinar-OT-DAVID-ET-GWENDAL-8-705x176.png 705w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><\/div><\/div><\/div><br \/>\n<div  class='avia-button-wrap av-mab26o39-5cb3f8148a9d6a7ecc8c6c2f67c54c0b-wrap avia-button-center  avia-builder-el-6  el_after_av_image  el_before_av_textblock '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-mab26o39-5cb3f8148a9d6a7ecc8c6c2f67c54c0b\">\n#top #wrap_all .avia-button.av-mab26o39-5cb3f8148a9d6a7ecc8c6c2f67c54c0b{\nmargin:0 0 40px 0;\n}\n<\/style>\n<a href='https:\/\/attendee.gotowebinar.com\/register\/1877672736997781086?source=website'  class='avia-button av-mab26o39-5cb3f8148a9d6a7ecc8c6c2f67c54c0b av-link-btn avia-icon_select-no avia-size-small avia-position-center avia-color-theme-color'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Register to the webinar\"><span class='avia_iconbox_title' >Register to the webinar<\/span><\/a><\/div><br \/>\n<section  class='av_textblock_section av-mab25ff4-956ca092f2c4215ec338a95e50c1220b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>La raret\u00e9 de comp\u00e9tences \u00e0 l&rsquo;interface IT\/OT<\/h2>\n<p>L&rsquo;impl\u00e9mentation du Zero Trust en environnement industriel n\u00e9cessite des profils hybrides ma\u00eetrisant \u00e0 la fois la cybers\u00e9curit\u00e9 et les contraintes op\u00e9rationnelles. Ces experts restent rare sur le march\u00e9. Les sp\u00e9cialistes en s\u00e9curit\u00e9 comprennent rarement les imp\u00e9ratifs op\u00e9rationnels, tandis que les ing\u00e9nieurs OT poss\u00e8dent g\u00e9n\u00e9ralement une connaissance limit\u00e9e des architectures de s\u00e9curit\u00e9.<\/p>\n<p>Cette p\u00e9nurie de talents cr\u00e9e des difficult\u00e9s concr\u00e8tes lors de la conception de solutions respectant les principes du Zero Trust sans compromettre la production. Les organisations peinent fr\u00e9quemment \u00e0 constituer des \u00e9quipes disposant de l&rsquo;expertise transversale n\u00e9cessaire pour naviguer entre les contraintes techniques et op\u00e9rationnelles sp\u00e9cifiques \u00e0 l&rsquo;impl\u00e9mentation du Zero Trust en contexte industriel.<\/p>\n<h2>La fracture dans la gouvernance<\/h2>\n<p>De nombreuses entreprises maintiennent des r\u00e9f\u00e9rentiels distincts pour la s\u00e9curit\u00e9 OT et IT, chacun avec des priorit\u00e9s et des tol\u00e9rances au risque sp\u00e9cifiques. Le Zero Trust exige pourtant des politiques unifi\u00e9es qui respectent les r\u00e9alit\u00e9s op\u00e9rationnelles tout en maintenant un niveau de s\u00e9curit\u00e9 coh\u00e9rent. Cette fragmentation de la gouvernance constitue un obstacle majeur \u00e0 l&rsquo;\u00e9tablissement de standards de s\u00e9curit\u00e9 homog\u00e8nes.<\/p>\n<p>Les projets Zero Trust s&rsquo;enlisent fr\u00e9quemment dans les discussions de gouvernance. Les \u00e9quipes s\u00e9curit\u00e9 pr\u00f4nent des contr\u00f4les exhaustifs comme le Multi-Factor Authentication universel, tandis que les responsables op\u00e9rationnels d\u00e9fendent des exceptions pour les situations d&rsquo;urgence ou les processus critiques. Ces divergences fondamentales n\u00e9cessitent souvent un arbitrage au niveau ex\u00e9cutif. L&rsquo;harmonisation des politiques devient un obstacle significatif lorsque les d\u00e9partements op\u00e8rent selon des priorit\u00e9s contradictoires en mati\u00e8re de s\u00e9curit\u00e9 et d&rsquo;exploitation.<\/p>\n<h2>L&rsquo;approche pragmatique : Zero Trust adapt\u00e9 \u00e0 l&rsquo;OT<\/h2>\n<p>Malgr\u00e9 ces d\u00e9fis, les environnements industriels et utilities progressent en adoptant une d\u00e9marche pragmatique :<\/p>\n<ul>\n<li>Segmentation prioritaire : L&rsquo;\u00e9tablissement de zones r\u00e9seau fonctionnelles constitue le socle pour des contr\u00f4les plus granulaires ult\u00e9rieurs. Cette approche \u00e9tablit des p\u00e9rim\u00e8tres de s\u00e9curit\u00e9 tout en minimisant l&rsquo;impact op\u00e9rationnel.<\/li>\n<li>Authentification progressive : S\u00e9curisation des points de jonction r\u00e9seau strat\u00e9giques avant de d\u00e9ployer des m\u00e9canismes de v\u00e9rification au niveau des \u00e9quipements. Cette m\u00e9thode s\u00e9quentielle permet aux organisations de valider les contr\u00f4les de s\u00e9curit\u00e9 avant un d\u00e9ploiement g\u00e9n\u00e9ralis\u00e9.<\/li>\n<li>Access governance contextuel : D\u00e9veloppement de r\u00e8gles sp\u00e9cifiques tenant compte des r\u00f4les op\u00e9rationnels, des proc\u00e9dures d&rsquo;urgence et des contraintes de processus. Cette approche reconna\u00eet les particularit\u00e9s des op\u00e9rations industrielles.<\/li>\n<li>Monitoring comme contr\u00f4le compensatoire : Le renforcement de la surveillance permet de d\u00e9tecter les comportements anormaux lorsque la v\u00e9rification syst\u00e9matique n&rsquo;est pas envisageable. Ce m\u00e9canisme compensatoire apporte une valeur s\u00e9curitaire significative lorsque l&rsquo;impl\u00e9mentation compl\u00e8te du Zero Trust se heurte \u00e0 des obstacles techniques.<\/li>\n<\/ul>\n<p>La question fondamentale n&rsquo;est pas de d\u00e9terminer si le Zero Trust a sa place dans les environnements industriels, mais plut\u00f4t comment adapter judicieusement ces principes \u00e0 des \u00e9cosyst\u00e8mes o\u00f9 les processus physiques, les contraintes technologiques et les imp\u00e9ratifs op\u00e9rationnels fa\u00e7onnent un paysage s\u00e9curitaire radicalement diff\u00e9rent.<\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409\">\n#top .flex_column_table.av-equal-height-column-flextable.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\nmargin-top:0px;\nmargin-bottom:0;\n}\n.flex_column.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409 av_one_third  avia-builder-el-8  el_after_av_two_third  el_before_av_one_full  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-eggfj0-da54e0145909a097d7c660a92952d26e av-social-sharing-box-default  avia-builder-el-9  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Partager cet article<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Partager sur X\" href='https:\/\/twitter.com\/share?text=Challenges%20et%20d%C3%A9fis%20de%20la%20mise%20en%20%C5%93uvre%20du%20Zero%20Trust%20dans%20un%20environnement%20OT&#038;url=https:\/\/www.wallix.com\/fr\/?p=71697' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager sur X'><span class='avia_hidden_link_text'>Partager sur X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Partager sur LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Challenges%20et%20d%C3%A9fis%20de%20la%20mise%20en%20%C5%93uvre%20du%20Zero%20Trust%20dans%20un%20environnement%20OT&#038;url=https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager sur LinkedIn'><span class='avia_hidden_link_text'>Partager sur LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Partager par Mail\" href='mailto:?subject=Challenges%20et%20d%C3%A9fis%20de%20la%20mise%20en%20%C5%93uvre%20du%20Zero%20Trust%20dans%20un%20environnement%20OT&#038;body=https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager par Mail'><span class='avia_hidden_link_text'>Partager par Mail<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a\">\n#top .hr.hr-invisible.av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a hr-invisible  avia-builder-el-10  el_after_av_social_share  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4gywq38-5f8305b1275f972394dcec671430d804\">\n#top .av_textblock_section.av-m4gywq38-5f8305b1275f972394dcec671430d804 .avia_textblock{\nfont-size:19px;\n}\n<\/style>\n<section  class='av_textblock_section av-m4gywq38-5f8305b1275f972394dcec671430d804 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 class=\"av-special-heading-tag\">Contenu connexe<\/h3>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2fklsyk-47345d08b4e405405f5336633191a3ed\">\n#top .hr.hr-invisible.av-2fklsyk-47345d08b4e405405f5336633191a3ed{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2fklsyk-47345d08b4e405405f5336633191a3ed hr-invisible  avia-builder-el-12  el_after_av_textblock  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-270hzek-2d8db4a23c76ed62e37f748bed9e92f8  avia-builder-el-13  el_after_av_hr  el_before_av_textblock   avia-builder-el-13  el_after_av_hr  el_before_av_textblock ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-71697 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : Challenges et d\u00e9fis de la mise en \u0153uvre du Zero Trust dans un environnement OT\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-04-17T13:57:02+01:00\" >17 Avril 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/' title='Lier vers : Challenges et d\u00e9fis de la mise en \u0153uvre du Zero Trust dans un environnement OT'>Challenges et d\u00e9fis de la mise en \u0153uvre du Zero Trust dans un environnement OT<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68384 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : 3 strat\u00e9gies \u00e9prouv\u00e9es pour renforcer la s\u00e9curit\u00e9 de l&#039;acc\u00e8s \u00e0 distance\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T15:35:36+01:00\" >12 F\u00e9vrier 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/3-strategies-eprouvees-pour-renforcer-la-securite-de-lacces-a-distance\/' title='Lier vers : 3 strat\u00e9gies \u00e9prouv\u00e9es pour renforcer la s\u00e9curit\u00e9 de l&rsquo;acc\u00e8s \u00e0 distance'>3 strat\u00e9gies \u00e9prouv\u00e9es pour renforcer la s\u00e9curit\u00e9 de l&rsquo;acc\u00e8s \u00e0 distance<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-56790 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : S\u00e9curisation des environnements industriels et risque de PC isol\u00e9s \u200d\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-04-17T10:42:17+01:00\" >17 Avril 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/securisation-des-environnements-industriels-et-risque-de-pc-isoles\/' title='Lier vers : S\u00e9curisation des environnements industriels et risque de PC isol\u00e9s \u200d'>S\u00e9curisation des environnements industriels et risque de PC isol\u00e9s \u200d<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-56764 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : Industrie 4.0 : L&#039;importance d&#039;assurer un avenir connect\u00e9\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-04-17T10:32:58+01:00\" >17 Avril 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/industrie-4-0-limportance-dassurer-un-avenir-connecte\/' title='Lier vers : Industrie 4.0 : L&rsquo;importance d&rsquo;assurer un avenir connect\u00e9'>Industrie 4.0 : L&rsquo;importance d&rsquo;assurer un avenir connect\u00e9<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-56744 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : Cybers\u00e9curit\u00e9 et sant\u00e9 : &quot;le d\u00e9fi n&#039;est pas seulement financier mais aussi humain&quot;.\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-04-17T10:28:27+01:00\" >17 Avril 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/cybersecurite-et-sante-le-defi-nest-pas-seulement-financier-mais-aussi-humain-2\/' title='Lier vers : Cybers\u00e9curit\u00e9 et sant\u00e9 : \u00ab\u00a0le d\u00e9fi n&rsquo;est pas seulement financier mais aussi humain\u00a0\u00bb.'>Cybers\u00e9curit\u00e9 et sant\u00e9 : \u00ab\u00a0le d\u00e9fi n&rsquo;est pas seulement financier mais aussi humain\u00a0\u00bb.<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-mab67vyg-b7a0275da54124d864a46687f353d039\">\n#top .av_textblock_section.av-mab67vyg-b7a0275da54124d864a46687f353d039 .avia_textblock{\nfont-size:19px;\n}\n<\/style>\n<section  class='av_textblock_section av-mab67vyg-b7a0275da54124d864a46687f353d039 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 class=\"av-special-heading-tag\">Ressources connexes<\/h3>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-15  el_after_av_textblock  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-2\"  class='av-magazine av-mab67ob0-ad3e73e6168b201798f62125d409c50f  avia-builder-el-16  el_after_av_hr  avia-builder-el-last   avia-builder-el-16  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-71697 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : Challenges et d\u00e9fis de la mise en \u0153uvre du Zero Trust dans un environnement OT\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-04-17T13:57:02+01:00\" >17 Avril 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/' title='Lier vers : Challenges et d\u00e9fis de la mise en \u0153uvre du Zero Trust dans un environnement OT'>Challenges et d\u00e9fis de la mise en \u0153uvre du Zero Trust dans un environnement OT<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68384 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : 3 strat\u00e9gies \u00e9prouv\u00e9es pour renforcer la s\u00e9curit\u00e9 de l&#039;acc\u00e8s \u00e0 distance\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T15:35:36+01:00\" >12 F\u00e9vrier 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/3-strategies-eprouvees-pour-renforcer-la-securite-de-lacces-a-distance\/' title='Lier vers : 3 strat\u00e9gies \u00e9prouv\u00e9es pour renforcer la s\u00e9curit\u00e9 de l&rsquo;acc\u00e8s \u00e0 distance'>3 strat\u00e9gies \u00e9prouv\u00e9es pour renforcer la s\u00e9curit\u00e9 de l&rsquo;acc\u00e8s \u00e0 distance<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-56790 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : S\u00e9curisation des environnements industriels et risque de PC isol\u00e9s \u200d\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-04-17T10:42:17+01:00\" >17 Avril 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/securisation-des-environnements-industriels-et-risque-de-pc-isoles\/' title='Lier vers : S\u00e9curisation des environnements industriels et risque de PC isol\u00e9s \u200d'>S\u00e9curisation des environnements industriels et risque de PC isol\u00e9s \u200d<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-56764 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : Industrie 4.0 : L&#039;importance d&#039;assurer un avenir connect\u00e9\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-04-17T10:32:58+01:00\" >17 Avril 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/industrie-4-0-limportance-dassurer-un-avenir-connecte\/' title='Lier vers : Industrie 4.0 : L&rsquo;importance d&rsquo;assurer un avenir connect\u00e9'>Industrie 4.0 : L&rsquo;importance d&rsquo;assurer un avenir connect\u00e9<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-56744 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : Cybers\u00e9curit\u00e9 et sant\u00e9 : &quot;le d\u00e9fi n&#039;est pas seulement financier mais aussi humain&quot;.\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-04-17T10:28:27+01:00\" >17 Avril 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/cybersecurite-et-sante-le-defi-nest-pas-seulement-financier-mais-aussi-humain-2\/' title='Lier vers : Cybers\u00e9curit\u00e9 et sant\u00e9 : \u00ab\u00a0le d\u00e9fi n&rsquo;est pas seulement financier mais aussi humain\u00a0\u00bb.'>Cybers\u00e9curit\u00e9 et sant\u00e9 : \u00ab\u00a0le d\u00e9fi n&rsquo;est pas seulement financier mais aussi humain\u00a0\u00bb.<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_one_full-16676c5e7d660a73299533f94aa3a293\">\n.flex_column.av-av_one_full-16676c5e7d660a73299533f94aa3a293{\npadding:0 20px 0 20px;\n}\n<\/style>\n<div  class='flex_column av-av_one_full-16676c5e7d660a73299533f94aa3a293 av_one_full  avia-builder-el-17  el_after_av_one_third  avia-builder-el-last  first flex_column_div  column-top-margin'     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_textblock-8a4885e4e9bbe8bae0c03850af01a72c\">\n#top .av_textblock_section.av-av_textblock-8a4885e4e9bbe8bae0c03850af01a72c .avia_textblock{\nfont-size:24px;\ncolor:#172542;\n}\n<\/style>\n<section  class='av_textblock_section av-av_textblock-8a4885e4e9bbe8bae0c03850af01a72c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p style=\"text-align: center;\">More resources<\/p>\n<\/div><\/section><br \/>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-even  avia-builder-el-19  el_after_av_textblock  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-56744 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/cybersecurite-et-sante-le-defi-nest-pas-seulement-financier-mais-aussi-humain-2\/' data-rel='slide-1' class='slide-image' title='Cybers\u00e9curit\u00e9 et sant\u00e9 : \u00ab\u00a0le d\u00e9fi n&rsquo;est pas seulement financier mais aussi humain\u00a0\u00bb.'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/04\/ot_img15-260x185.jpg\" class=\"wp-image-54703 avia-img-lazy-loading-not-54703 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"A contextual illustration from an OT\u2011focused WALLIX blog post about cybersecurity challenges in operational technology, likely showing industrial systems or people working in an OT environment. The image supports content on securing critical infrastructure and applying Zero Trust principles in industry\u2011grade networks.\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Cybers\u00e9curit\u00e9 et sant\u00e9 : &quot;le d\u00e9fi n&#039;est pas seulement financier mais aussi humain&quot;.\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/cybersecurite-et-sante-le-defi-nest-pas-seulement-financier-mais-aussi-humain-2\/' title='Cybers\u00e9curit\u00e9 et sant\u00e9 : \u00ab\u00a0le d\u00e9fi n&rsquo;est pas seulement financier mais aussi humain\u00a0\u00bb.'>Cybers\u00e9curit\u00e9 et sant\u00e9 : \u00ab\u00a0le d\u00e9fi n&rsquo;est pas seulement financier mais aussi humain\u00a0\u00bb.<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2024-04-17T10:28:27+01:00\" >17 Avril 2024<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/cybersecurite-et-sante-le-defi-nest-pas-seulement-financier-mais-aussi-humain-2\/\" class=\"more-link\">Lire la suite<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/04\/ot_img15-scaled.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>2048<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2560<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>admin<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/06\/wallx_2023_OK062023_blanc_OK.svg<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>admin<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2025-04-17T13:57:02+01:00\" >2024-04-17 10:28:27<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-08-27 10:19:54<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Cybers\u00e9curit\u00e9 et sant\u00e9 : \u00ab\u00a0le d\u00e9fi n&rsquo;est pas seulement financier mais aussi humain\u00a0\u00bb.<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-37615 slide-entry-overview slide-loop-2 slide-parity-even  post-entry-last  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.wallix.com\/fr\/blogpost\/lot-dans-les-hopitaux-le-talon-dachille-du-secteur-de-la-sante\/' data-rel='slide-1' class='slide-image' title='OT dans les h\u00f4pitaux : vuln\u00e9rabilit\u00e9 du secteur sant\u00e9'><img decoding=\"async\" loading=\"lazy\" width=\"260\" height=\"185\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/AdobeStock_672834802-260x185.jpeg\" class=\"wp-image-38456 avia-img-lazy-loading-38456 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"security for healthcare\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: OT dans les h\u00f4pitaux : vuln\u00e9rabilit\u00e9 du secteur sant\u00e9\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/blogpost\/lot-dans-les-hopitaux-le-talon-dachille-du-secteur-de-la-sante\/' title='OT dans les h\u00f4pitaux : vuln\u00e9rabilit\u00e9 du secteur sant\u00e9'>OT dans les h\u00f4pitaux : vuln\u00e9rabilit\u00e9 du secteur sant\u00e9<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-12-14T14:14:36+01:00\" >14 D\u00e9cembre 2023<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><div class=\"read-more-link\"><a href=\"https:\/\/www.wallix.com\/fr\/blogpost\/lot-dans-les-hopitaux-le-talon-dachille-du-secteur-de-la-sante\/\" class=\"more-link\">Lire la suite<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/AdobeStock_672834802-scaled.jpeg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1191<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2560<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>WALLIX<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/06\/wallx_2023_OK062023_blanc_OK.svg<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>WALLIX<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2025-04-17T13:57:02+01:00\" >2023-12-14 14:14:36<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-02-10 13:59:04<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>OT dans les h\u00f4pitaux : vuln\u00e9rabilit\u00e9 du secteur sant\u00e9<\/span><\/span><\/span><\/article><\/div><\/div><\/div><\/p><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":22582,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1640,1748,2457,2445,1756,1832],"tags":[],"class_list":["post-71697","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","category-industrie-fr","category-ot-fr","category-ot-blogpost-fr","category-blog-protocoles-industriels","category-zero-trust-blogpost-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero trust dans l&#039;OT - Quels challenges et quels d\u00e9fis ? - WALLIX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero trust dans l&#039;OT - Quels challenges et quels d\u00e9fis ? - WALLIX\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-17T12:57:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-05T14:23:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/industrial-robot-iiot.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"626\" \/>\n\t<meta property=\"og:image:height\" content=\"417\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/ot-blogpost-fr\\\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/ot-blogpost-fr\\\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/person\\\/20943bf30b135b2bcc1b4a4159521f5c\"},\"headline\":\"Challenges et d\u00e9fis de la mise en \u0153uvre du Zero Trust dans un environnement OT\",\"datePublished\":\"2025-04-17T12:57:02+00:00\",\"dateModified\":\"2025-05-05T14:23:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/ot-blogpost-fr\\\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\\\/\"},\"wordCount\":3859,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/ot-blogpost-fr\\\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/industrial-robot-iiot.jpg\",\"articleSection\":[\"BLOGPOST\",\"INDUSTRIE\",\"OT\",\"OT BLOGPOST\",\"PROTOCOLES INDUSTRIELS\",\"ZERO TRUST\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/ot-blogpost-fr\\\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/ot-blogpost-fr\\\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\\\/\",\"name\":\"Zero trust dans l'OT - Quels challenges et quels d\u00e9fis ? - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/ot-blogpost-fr\\\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/ot-blogpost-fr\\\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/industrial-robot-iiot.jpg\",\"datePublished\":\"2025-04-17T12:57:02+00:00\",\"dateModified\":\"2025-05-05T14:23:35+00:00\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/fr\\\/ot-blogpost-fr\\\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/ot-blogpost-fr\\\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/industrial-robot-iiot.jpg\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/industrial-robot-iiot.jpg\",\"width\":626,\"height\":417,\"caption\":\"OT zerotrust\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/person\\\/20943bf30b135b2bcc1b4a4159521f5c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db7f06118b47cad9dda3008e06e43ba14f3c688cdbc6c42cef9a9c50e1ef1751?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db7f06118b47cad9dda3008e06e43ba14f3c688cdbc6c42cef9a9c50e1ef1751?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db7f06118b47cad9dda3008e06e43ba14f3c688cdbc6c42cef9a9c50e1ef1751?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero trust dans l'OT - Quels challenges et quels d\u00e9fis ? - WALLIX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/","og_locale":"fr_FR","og_type":"article","og_title":"Zero trust dans l'OT - Quels challenges et quels d\u00e9fis ? - WALLIX","og_url":"https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/","og_site_name":"WALLIX","article_published_time":"2025-04-17T12:57:02+00:00","article_modified_time":"2025-05-05T14:23:35+00:00","og_image":[{"width":626,"height":417,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/industrial-robot-iiot.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/"},"author":{"name":"admin","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/person\/20943bf30b135b2bcc1b4a4159521f5c"},"headline":"Challenges et d\u00e9fis de la mise en \u0153uvre du Zero Trust dans un environnement OT","datePublished":"2025-04-17T12:57:02+00:00","dateModified":"2025-05-05T14:23:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/"},"wordCount":3859,"publisher":{"@id":"https:\/\/www.wallix.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/industrial-robot-iiot.jpg","articleSection":["BLOGPOST","INDUSTRIE","OT","OT BLOGPOST","PROTOCOLES INDUSTRIELS","ZERO TRUST"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/","url":"https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/","name":"Zero trust dans l'OT - Quels challenges et quels d\u00e9fis ? - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/industrial-robot-iiot.jpg","datePublished":"2025-04-17T12:57:02+00:00","dateModified":"2025-05-05T14:23:35+00:00","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.wallix.com\/fr\/ot-blogpost-fr\/challenges-et-defis-mise-en-oeuvre-du-zerotrust-dans-environnement-ot\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/industrial-robot-iiot.jpg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/06\/industrial-robot-iiot.jpg","width":626,"height":417,"caption":"OT zerotrust"},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/fr\/#website","url":"https:\/\/www.wallix.com\/fr\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/fr\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/person\/20943bf30b135b2bcc1b4a4159521f5c","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/db7f06118b47cad9dda3008e06e43ba14f3c688cdbc6c42cef9a9c50e1ef1751?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/db7f06118b47cad9dda3008e06e43ba14f3c688cdbc6c42cef9a9c50e1ef1751?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/db7f06118b47cad9dda3008e06e43ba14f3c688cdbc6c42cef9a9c50e1ef1751?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/www.wallix.com\/fr\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/71697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/comments?post=71697"}],"version-history":[{"count":5,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/71697\/revisions"}],"predecessor-version":[{"id":72287,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/71697\/revisions\/72287"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/media\/22582"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/media?parent=71697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/categories?post=71697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/tags?post=71697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}