{"id":111979,"date":"2022-08-27T00:00:15","date_gmt":"2022-08-26T22:00:15","guid":{"rendered":"https:\/\/jalix.fr\/?page_id=111979"},"modified":"2022-12-02T03:30:50","modified_gmt":"2022-12-02T02:30:50","slug":"it-security-audit","status":"publish","type":"page","link":"https:\/\/jalix.fr\/en\/it-services\/it-security-audit\/","title":{"rendered":"IT security audit"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div data-parent=\"true\" class=\"vc_row has-bg need-focus style-color-483103-bg row-container with-parallax\" id=\"row-unique-0\"><div class=\"row-background background-element\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"background-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"background-inner\" style=\"background-image: url(https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-912617272-scaled.jpg);background-repeat: no-repeat;background-position: center bottom;background-size: cover;\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"block-bg-overlay style-color-105898-bg\" style=\"opacity: 0.35;\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div><div class=\"row limit-width row-parent\" data-height-ratio=\"75\"><div class=\"wpb_row row-inner\"><div class=\"wpb_column pos-middle pos-center align_center column_parent col-lg-12 half-internal-gutter\"><div class=\"uncol style-spec style-dark\"  ><div class=\"uncoltable\"><div class=\"uncell\" ><div class=\"uncont no-block-padding col-custom-width\" style=\" max-width:996px;\" ><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h1 class=\"fontsize-160000 fontspace-135905 text-uppercase\" ><span>IT security audit<\/span><\/h1><\/div><div class=\"clear\"><\/div><\/div><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h2 class=\"font-339240 fontsize-338686\" ><span>For a successful digital transformation, identify and correct the obstacles within your IS<\/span><\/h2><\/div><div class=\"clear\"><\/div><\/div><div class=\"empty-space empty-single\" ><span class=\"empty-space-inner\"><\/span><\/div>\n<\/div><\/div><\/div><\/div><\/div><script id=\"script-row-unique-0\" data-row=\"script-row-unique-0\" type=\"text\/javascript\" class=\"vc_controls\">UNCODE.initRow(document.getElementById(\"row-unique-0\"));<\/script><\/div><\/div><\/div><div data-parent=\"true\" class=\"vc_row has-bg need-focus style-color-xsdn-bg row-container\" id=\"row-unique-1\"><div class=\"row unequal col-double-gutter quad-top-padding quad-bottom-padding single-h-padding limit-width row-parent\"><div class=\"wpb_row row-inner\"><div class=\"wpb_column pos-top pos-center align_left column_parent col-lg-6 col-md-50 half-internal-gutter\"><div class=\"uncol style-light\"  ><div class=\"uncoltable\"><div class=\"uncell no-block-padding\" ><div class=\"uncont\" ><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h5 class=\"font-613363 fontsize-160000 fontspace-135905 text-accent-color text-uppercase\" ><span>IT security audit<\/span><\/h5><\/div><div class=\"clear\"><\/div><\/div><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h3 class=\"font-339240 fontsize-155944\" ><span>Support to validate your transformation scenario<\/span><\/h3><\/div><div class=\"clear\"><\/div><\/div><div class=\"uncode_text_column\" ><p>JALIX offers a flash diagnosis of your information system to evaluate the conditions of implementation and secure the deployment of solutions.<\/p>\n<p>Our three-stage approach, including audit &amp; diagnosis, specification and publisher consultation facilitation, can be revised according to early decision milestones and is very agile.<\/p>\n<p>The spectrum of our audits is wide: verification of the configuration of a Microsoft hybrid infrastructure, compliance with the RGDP, security compliance, etc., and can make it possible to establish a master plan and\/or propose evolution projects with significant gains for the company.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column pos-top pos-center align_left column_parent col-lg-6 half-internal-gutter\"><div class=\"uncol style-light\"  ><div class=\"uncoltable\"><div class=\"uncell no-block-padding\" ><div class=\"uncont\" ><div class=\"empty-space empty-single\" ><span class=\"empty-space-inner\"><\/span><\/div>\n<div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h4 class=\"font-339240\" ><span>Why conduct an IT security audit?<\/span><\/h4><\/div><div class=\"clear\"><\/div><\/div><div class=\"uncode_text_column\" ><p>The development of the Internet, the interconnection of networks and the interconnection of devices are all factors that multiply the IT risks within companies.<\/p>\n<p>Whether it is a question of internal risks (lack of employee awareness, errors and incidents, access to critical data, malicious intent, former employees, etc.) or external risks (viruses, intrusions, phishing, espionage, etc.), the security of the information system is now a major issue in the governance of any structure.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><script id=\"script-row-unique-1\" data-row=\"script-row-unique-1\" type=\"text\/javascript\" class=\"vc_controls\">UNCODE.initRow(document.getElementById(\"row-unique-1\"));<\/script><\/div><\/div><\/div><div data-parent=\"true\" class=\"vc_row has-bg need-focus style-color-lxmt-bg row-container\" id=\"row-unique-2\"><div class=\"row unequal col-double-gutter quad-top-padding quad-bottom-padding quad-h-padding full-width row-parent\"><div class=\"wpb_row row-inner\"><div class=\"wpb_column pos-top pos-center align_left column_parent col-lg-6 single-internal-gutter\"><div class=\"uncol style-light animate_when_almost_visible left-t-right\"  data-speed=\"1000\"><div class=\"uncoltable\"><div class=\"uncell no-block-padding\" ><div class=\"uncont\" ><div class=\"uncode-single-media  text-left\" data-cursor=\"icon-accent\"><div class=\"single-wrapper\" style=\"max-width: 100%;\"><div class=\"tmb tmb-light  img-round img-round-xs tmb-img-ratio tmb-media-first tmb-media-last tmb-content-overlay tmb-no-bg\"><div class=\"t-inside\"><div class=\"t-entry-visual\"><div class=\"t-entry-visual-tc\"><div class=\"uncode-single-media-wrapper img-round img-round-xs\"><div class=\"dummy\" style=\"padding-top: 75%;\"><\/div><img decoding=\"async\" class=\"wp-image-111657\" src=\"https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-1365436662-scaled-uai-2276x1707.jpg\" width=\"2276\" height=\"1707\" alt=\"\" srcset=\"https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-1365436662-scaled-uai-2276x1707.jpg 2276w, https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-1365436662-scaled-uai-720x540.jpg 720w, https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-1365436662-scaled-uai-1032x774.jpg 1032w\" sizes=\"(max-width: 2276px) 100vw, 2276px\" \/><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column pos-middle pos-left align_left column_parent col-lg-6 half-internal-gutter z_index_2\"><div class=\"uncol style-light font-613363 animate_when_almost_visible alpha-anim\"  data-delay=\"200\" data-speed=\"1000\"><div class=\"uncoltable\"><div class=\"uncell no-block-padding\" ><div class=\"uncont\" style=\" max-width:624px;\" ><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h2 class=\"font-339240 fontsize-155944\" ><span>The IT security audit is used to:<\/span><\/h2><\/div><div class=\"clear\"><\/div><\/div><div class=\"uncode-wrapper uncode-list\" >\n<ul class=\"icons text-lead\">\n<li><i class=\"fa fa-check2 text-accent-color\"><\/i>Ensure the integrity of the company's data and information assets.<\/li>\n<li><i class=\"fa fa-check2 text-accent-color\"><\/i>Discovering and understanding possible vulnerabilities in the information system<\/li>\n<li><i class=\"fa fa-check2 text-accent-color\"><\/i>Implementing protection and security policies adapted to the company's operations and its information system.<\/li>\n<\/ul>\n<\/div><div class=\"uncode_text_column\" ><p>The role of the<a href=\"https:\/\/jalix.fr\/en\/it-services\/it-security-audit\/\">IT security audit<\/a> is to enable the identification of risks and possible flaws in the company's security system, in order to better correct them and protect against threats, even before they occur.<\/p>\n<p>It is therefore advisable to carry out regular audits of the system, for example once a year, in order to have up-to-date recommendations adapted to the evolution of the company's information system, technologies, uses and threats.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><script id=\"script-row-unique-2\" data-row=\"script-row-unique-2\" type=\"text\/javascript\" class=\"vc_controls\">UNCODE.initRow(document.getElementById(\"row-unique-2\"));<\/script><\/div><\/div><\/div><div data-parent=\"true\" class=\"vc_row inverted-device-order has-bg need-focus style-color-xsdn-bg row-container\" id=\"row-unique-3\"><div class=\"row unequal col-double-gutter quad-top-padding quad-bottom-padding quad-h-padding full-width row-parent\"><div class=\"wpb_row row-inner\"><div class=\"wpb_column pos-middle pos-right align_left column_parent col-lg-6 half-internal-gutter z_index_2\"><div class=\"uncol style-light font-613363 animate_when_almost_visible alpha-anim\"  data-delay=\"200\" data-speed=\"1000\"><div class=\"uncoltable\"><div class=\"uncell no-block-padding\" ><div class=\"uncont\" style=\" max-width:624px;\" ><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h2 class=\"font-339240 fontsize-155944\" ><span>What actions can be taken in an IT security audit?<\/span><\/h2><\/div><div class=\"clear\"><\/div><\/div><div class=\"uncode_text_column\" ><p>In a <strong>IT security audit<\/strong>The following elements, among others, are examined:<\/p>\n<\/div><div class=\"uncode-wrapper uncode-list\" >\n<ul class=\"icons text-lead\">\n<li><i class=\"fa fa-check2 text-accent-color\"><\/i>Equipment: desktops, laptops, tablets, mobile phones<\/li>\n<li><i class=\"fa fa-check2 text-accent-color\"><\/i>Operating systems: their versions, their updates<\/li>\n<li><i class=\"fa fa-check2 text-accent-color\"><\/i>Software and applications (management software, business software, messaging, etc.)<\/li>\n<li><i class=\"fa fa-check2 text-accent-color\"><\/i>Network and telecom infrastructure<\/li>\n<li><i class=\"fa fa-check2 text-accent-color\"><\/i>The risks associated with a possible loss of data integrity,<\/li>\n<li><i class=\"fa fa-check2 text-accent-color\"><\/i>Employee rights and access<\/li>\n<li><i class=\"fa fa-check2 text-accent-color\"><\/i>Backup requirements (hosted, redundant, etc.)<\/li>\n<li><i class=\"fa fa-check2 text-accent-color\"><\/i>Computer security tools (antivirus, firewall, antispam)<\/li>\n<li><i class=\"fa fa-check2 text-accent-color\"><\/i>The company's IT security policy<\/li>\n<li><i class=\"fa fa-check2 text-accent-color\"><\/i>External safety devices<\/li>\n<\/ul>\n<\/div><div class=\"uncode_text_column\" ><p>If necessary, intrusion tests can be performed to complete the security audit.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column pos-top pos-center align_left column_parent col-lg-6 single-internal-gutter\"><div class=\"uncol style-light animate_when_almost_visible right-t-left\"  data-speed=\"1000\"><div class=\"uncoltable\"><div class=\"uncell no-block-padding\" ><div class=\"uncont\" ><div class=\"uncode-single-media  text-right\" data-cursor=\"icon-accent\"><div class=\"single-wrapper\" style=\"max-width: 100%;\"><div class=\"tmb tmb-light  img-round img-round-xs tmb-img-ratio tmb-media-first tmb-media-last tmb-content-overlay tmb-no-bg\"><div class=\"t-inside\"><div class=\"t-entry-visual\"><div class=\"t-entry-visual-tc\"><div class=\"uncode-single-media-wrapper img-round img-round-xs\"><div class=\"dummy\" style=\"padding-top: 75%;\"><\/div><img decoding=\"async\" class=\"wp-image-111656\" src=\"https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-1364929981-scaled-uai-2276x1707.jpg\" width=\"2276\" height=\"1707\" alt=\"\" srcset=\"https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-1364929981-scaled-uai-2276x1707.jpg 2276w, https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-1364929981-scaled-uai-720x540.jpg 720w, https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-1364929981-scaled-uai-1032x774.jpg 1032w\" sizes=\"(max-width: 2276px) 100vw, 2276px\" \/><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><script id=\"script-row-unique-3\" data-row=\"script-row-unique-3\" type=\"text\/javascript\" class=\"vc_controls\">UNCODE.initRow(document.getElementById(\"row-unique-3\"));<\/script><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"IT security auditFor a successful digital transformation, identify and correct the obstacles within your IS IT security audit [...]","protected":false},"author":1,"featured_media":0,"parent":111835,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-111979","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Audit de s\u00e9curit\u00e9 informatique &#187; Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes<\/title>\n<meta name=\"description\" content=\"Audit de s\u00e9curit\u00e9 informatique : JALIX propose un diagnostic flash de votre syst\u00e8me d\u2019information pour \u00e9valuer et s\u00e9curiser le d\u00e9ploiement des solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jalix.fr\/en\/it-services\/it-security-audit\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Audit de s\u00e9curit\u00e9 informatique &#187; Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes\" \/>\n<meta property=\"og:description\" content=\"Audit de s\u00e9curit\u00e9 informatique : JALIX propose un diagnostic flash de votre syst\u00e8me d\u2019information pour \u00e9valuer et s\u00e9curiser le d\u00e9ploiement des solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jalix.fr\/en\/it-services\/it-security-audit\/\" \/>\n<meta property=\"og:site_name\" content=\"Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/fr-fr.facebook.com\/JalixServices\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-02T02:30:50+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@JalixServices\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jalix.fr\/services-it\/audit-de-securite-informatique\/\",\"url\":\"https:\/\/jalix.fr\/services-it\/audit-de-securite-informatique\/\",\"name\":\"Audit de s\u00e9curit\u00e9 informatique &#187; Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes\",\"isPartOf\":{\"@id\":\"https:\/\/jalix.fr\/#website\"},\"datePublished\":\"2022-08-26T22:00:15+00:00\",\"dateModified\":\"2022-12-02T02:30:50+00:00\",\"description\":\"Audit de s\u00e9curit\u00e9 informatique : JALIX propose un diagnostic flash de votre syst\u00e8me d\u2019information pour \u00e9valuer et s\u00e9curiser le d\u00e9ploiement des solutions.\",\"breadcrumb\":{\"@id\":\"https:\/\/jalix.fr\/services-it\/audit-de-securite-informatique\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jalix.fr\/services-it\/audit-de-securite-informatique\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jalix.fr\/services-it\/audit-de-securite-informatique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/jalix.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/jalix.fr\/services-it\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Audit de s\u00e9curit\u00e9 informatique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jalix.fr\/#website\",\"url\":\"https:\/\/jalix.fr\/\",\"name\":\"Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes\",\"description\":\"Votre partenaire informatique, bureautique, cloud et logiciels\",\"publisher\":{\"@id\":\"https:\/\/jalix.fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jalix.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jalix.fr\/#organization\",\"name\":\"Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes\",\"url\":\"https:\/\/jalix.fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/jalix.fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/Logo-Mono-fonce\u0301-1.png\",\"contentUrl\":\"https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/Logo-Mono-fonce\u0301-1.png\",\"width\":150,\"height\":60,\"caption\":\"Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes\"},\"image\":{\"@id\":\"https:\/\/jalix.fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/fr-fr.facebook.com\/JalixServices\",\"https:\/\/x.com\/JalixServices\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT security audit \" Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes","description":"IT security audit: JALIX offers a flash diagnosis of your information system to evaluate and secure the deployment of solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jalix.fr\/en\/it-services\/it-security-audit\/","og_locale":"en_GB","og_type":"article","og_title":"Audit de s\u00e9curit\u00e9 informatique &#187; Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes","og_description":"Audit de s\u00e9curit\u00e9 informatique : JALIX propose un diagnostic flash de votre syst\u00e8me d\u2019information pour \u00e9valuer et s\u00e9curiser le d\u00e9ploiement des solutions.","og_url":"https:\/\/jalix.fr\/en\/it-services\/it-security-audit\/","og_site_name":"Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes","article_publisher":"https:\/\/fr-fr.facebook.com\/JalixServices","article_modified_time":"2022-12-02T02:30:50+00:00","twitter_card":"summary_large_image","twitter_site":"@JalixServices","twitter_misc":{"Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jalix.fr\/services-it\/audit-de-securite-informatique\/","url":"https:\/\/jalix.fr\/services-it\/audit-de-securite-informatique\/","name":"IT security audit \" Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes","isPartOf":{"@id":"https:\/\/jalix.fr\/#website"},"datePublished":"2022-08-26T22:00:15+00:00","dateModified":"2022-12-02T02:30:50+00:00","description":"IT security audit: JALIX offers a flash diagnosis of your information system to evaluate and secure the deployment of solutions.","breadcrumb":{"@id":"https:\/\/jalix.fr\/services-it\/audit-de-securite-informatique\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jalix.fr\/services-it\/audit-de-securite-informatique\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jalix.fr\/services-it\/audit-de-securite-informatique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/jalix.fr\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/jalix.fr\/services-it\/"},{"@type":"ListItem","position":3,"name":"Audit de s\u00e9curit\u00e9 informatique"}]},{"@type":"WebSite","@id":"https:\/\/jalix.fr\/#website","url":"https:\/\/jalix.fr\/","name":"Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes","description":"Your IT, office, cloud and software partner","publisher":{"@id":"https:\/\/jalix.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jalix.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/jalix.fr\/#organization","name":"Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes","url":"https:\/\/jalix.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/jalix.fr\/#\/schema\/logo\/image\/","url":"https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/Logo-Mono-fonce\u0301-1.png","contentUrl":"https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/Logo-Mono-fonce\u0301-1.png","width":150,"height":60,"caption":"Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes"},"image":{"@id":"https:\/\/jalix.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr-fr.facebook.com\/JalixServices","https:\/\/x.com\/JalixServices"]}]}},"_links":{"self":[{"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/pages\/111979","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/comments?post=111979"}],"version-history":[{"count":5,"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/pages\/111979\/revisions"}],"predecessor-version":[{"id":112998,"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/pages\/111979\/revisions\/112998"}],"up":[{"embeddable":true,"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/pages\/111835"}],"wp:attachment":[{"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/media?parent=111979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}