{"id":17331,"date":"2023-08-11T14:24:09","date_gmt":"2023-08-11T12:24:09","guid":{"rendered":"https:\/\/www.kappadata.be\/?p=17331"},"modified":"2023-08-11T14:24:09","modified_gmt":"2023-08-11T12:24:09","slug":"extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau","status":"publish","type":"post","link":"https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/","title":{"rendered":"ExtremeControl Network Access Control assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau!"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row css_animation=\u00a0\u00bb\u00a0\u00bb row_type=\u00a0\u00bbrow\u00a0\u00bb use_row_as_full_screen_section=\u00a0\u00bbno\u00a0\u00bb type=\u00a0\u00bbfull_width\u00a0\u00bb angled_section=\u00a0\u00bbno\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb background_image_as_pattern=\u00a0\u00bbwithout_pattern\u00a0\u00bb][vc_column][vc_column_text]<em><a href=\"https:\/\/www.kappadata.be\/fr\/vendors\/extreme-networks\/\">Extreme Networks<\/a>\u00a0ExtremeControl for ExtremeCloud IQ &#8211; SiteEngine assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau gr\u00e2ce \u00e0 la s\u00e9curit\u00e9 des points d&rsquo;extr\u00e9mit\u00e9 ! Il prot\u00e8ge contre les menaces externes en prenant en charge une visibilit\u00e9 approfondie et un contr\u00f4le d&rsquo;acc\u00e8s pour tous les terminaux de vos r\u00e9seaux c\u00e2bl\u00e9s et sans fil. Ses politiques compl\u00e8tes garantissent le respect des obligations de conformit\u00e9 \u00e0 l&rsquo;aide de politiques cibl\u00e9es qui peuvent \u00eatre appliqu\u00e9es aux utilisateurs ainsi qu&rsquo;aux appareils BYOD et IoT.<\/em>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=\u00a0\u00bb\u00a0\u00bb row_type=\u00a0\u00bbrow\u00a0\u00bb use_row_as_full_screen_section=\u00a0\u00bbno\u00a0\u00bb type=\u00a0\u00bbfull_width\u00a0\u00bb angled_section=\u00a0\u00bbno\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb background_image_as_pattern=\u00a0\u00bbwithout_pattern\u00a0\u00bb][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\u00a0\u00bb\u00a0\u00bb row_type=\u00a0\u00bbrow\u00a0\u00bb use_row_as_full_screen_section=\u00a0\u00bbno\u00a0\u00bb type=\u00a0\u00bbfull_width\u00a0\u00bb angled_section=\u00a0\u00bbno\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb background_image_as_pattern=\u00a0\u00bbwithout_pattern\u00a0\u00bb][vc_column][vc_single_image image=\u00a0\u00bb17332&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb qode_css_animation=\u00a0\u00bb\u00a0\u00bb][\/vc_column][\/vc_row][vc_row css_animation=\u00a0\u00bb\u00a0\u00bb row_type=\u00a0\u00bbrow\u00a0\u00bb use_row_as_full_screen_section=\u00a0\u00bbno\u00a0\u00bb type=\u00a0\u00bbfull_width\u00a0\u00bb angled_section=\u00a0\u00bbno\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb background_image_as_pattern=\u00a0\u00bbwithout_pattern\u00a0\u00bb][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\u00a0\u00bb\u00a0\u00bb row_type=\u00a0\u00bbrow\u00a0\u00bb use_row_as_full_screen_section=\u00a0\u00bbno\u00a0\u00bb type=\u00a0\u00bbfull_width\u00a0\u00bb angled_section=\u00a0\u00bbno\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb background_image_as_pattern=\u00a0\u00bbwithout_pattern\u00a0\u00bb][vc_column][vc_column_text]<\/p>\n<h4><strong>S\u00e9curit\u00e9 d&rsquo;acc\u00e8s<br \/>\n<\/strong><\/h4>\n<p>ExtremeControl voor ExtremeCloud IQ \u2013 SiteEngine. Assurez la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie du r\u00e9seau gr\u00e2ce \u00e0 la s\u00e9curit\u00e9 des points d&rsquo;extr\u00e9mit\u00e9.<\/p>\n<ul>\n<li>Contr\u00f4le d&rsquo;acc\u00e8s au r\u00e9seau bas\u00e9 sur les r\u00f4les pour tous les appareils, y compris les appareils r\u00e9seau tiers.<\/li>\n<li>Acc\u00e8s s\u00e9curis\u00e9 des invit\u00e9s et onboarding BYOD<\/li>\n<li>Int\u00e9gration avec des solutions tierces telles que NGFW, SIEM, CMDB, s\u00e9curit\u00e9 internet et EMM\/MDM.<\/li>\n<li>Acc\u00e8s s\u00e9curis\u00e9 au r\u00e9seau IoT<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><\/p>\n<h4><strong>Efficacit\u00e9 op\u00e9rationnelle<\/strong><\/h4>\n<ul>\n<li>Alertes automatiques sur les performances<\/li>\n<li>\u00c9cran unique pour la gestion, la politique, le contr\u00f4le d&rsquo;acc\u00e8s et l&rsquo;analyse des applications.<\/li>\n<li>D\u00e9pannage acc\u00e9l\u00e9r\u00e9 via la s\u00e9paration des probl\u00e8mes de r\u00e9seau et d&rsquo;application.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><strong>Orientation entreprise<\/strong><\/h4>\n<ul>\n<li>Politiques contextuelles et coh\u00e9rentes de la p\u00e9riph\u00e9rie au centre de donn\u00e9es<\/li>\n<li>Pr\u00e9vention de l&rsquo;acc\u00e8s au r\u00e9seau pour les utilisateurs non autoris\u00e9s et les points d&rsquo;extr\u00e9mit\u00e9 compromis<\/li>\n<li>Des initiatives essentielles telles que BYOD et loT sont mises en \u0153uvre en toute s\u00e9curit\u00e9.<\/li>\n<\/ul>\n<p>La plupart des violations de donn\u00e9es commencent au niveau des terminaux, d&rsquo;o\u00f9 la n\u00e9cessit\u00e9 de contr\u00f4ler les utilisateurs et les appareils loT et de mettre en place des politiques coh\u00e9rentes sur l&rsquo;ensemble du r\u00e9seau dans le cadre du multicloud. Avec ExtremeControl, une application disponible dans le cadre d&rsquo;ExtremeCloud IQ &#8211; Site Engine1, les utilisateurs disposent d&rsquo;une visibilit\u00e9 et d&rsquo;un contr\u00f4le profonds et centralis\u00e9s sur tous les terminaux de leur r\u00e9seau, gr\u00e2ce \u00e0 un tableau de bord simple, flexible et facile \u00e0 utiliser.<\/p>\n<p>ExtremeControl permet de s\u00e9curiser le BYOD et le loT afin de prot\u00e9ger le r\u00e9seau contre les menaces ext\u00e9rieures. Il offre une gestion centralis\u00e9e et la possibilit\u00e9 de d\u00e9finir des politiques granulaires pour r\u00e9pondre aux obligations de conformit\u00e9, localiser, authentifier les utilisateurs et les appareils et appliquer des politiques cibl\u00e9es.<\/p>\n<p>ExtremeControl s&rsquo;int\u00e8gre aux principales plateformes d&rsquo;entreprise, y compris la s\u00e9curit\u00e9 du r\u00e9seau, la gestion de la mobilit\u00e9, l&rsquo;analyse, les solutions de cloud et de centre de donn\u00e9es. En outre, il fournit une API ouverte pour les int\u00e9grations personnalis\u00e9es avec les principales plateformes d&rsquo;entreprise.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h4><strong>Avantages<br \/>\n<\/strong><\/h4>\n<h5>Rapports avanc\u00e9s<\/h5>\n<p>ExtremeControl facilite la surveillance des probl\u00e8mes sur le r\u00e9seau &#8211; le tout sur un tableau de bord facile \u00e0 lire. Il envoie des rapports et des alertes avanc\u00e9s et personnalisables sur l&rsquo;authentification, l&rsquo;acc\u00e8s des invit\u00e9s, l&rsquo;onboarding, les profils d&rsquo;appareils et l&rsquo;authentification, ainsi que sur l&rsquo;\u00e9tat du syst\u00e8me \u00e0 la fin. Lors du d\u00e9ploiement de grands projets, vous r\u00e9duisez les risques en testant de nouvelles politiques et en utilisant des politiques passives pour des sc\u00e9narios de simulation avant l&rsquo;application. ExtremeControl identifie les menaces en profilant et en suivant les utilisateurs et les appareils, ainsi qu&rsquo;en contr\u00f4lant la sant\u00e9 et la conformit\u00e9 des appareils avant et apr\u00e8s l&rsquo;acc\u00e8s. ExtremeControl peut \u00e9galement traiter les contr\u00f4les de politique fournis par des solutions MDM\/EMM tierces int\u00e9gr\u00e9es pour s&rsquo;assurer que les politiques d\u00e9finies fonctionnent ou pour appliquer ces politiques. Il peut \u00e9galement fournir des rapports et des statuts sur le nombre d&rsquo;appareils non conformes et\/ou d\u00e9sactiv\u00e9s qui ont restreint l&rsquo;acc\u00e8s au r\u00e9seau avec un contexte suppl\u00e9mentaire sur o\u00f9, quand et comment. ExtremeControl permet aux auditeurs de conformit\u00e9 et aux \u00e9quipes de s\u00e9curit\u00e9 d&rsquo;obtenir les donn\u00e9es pertinentes dont ils ont besoin pour prendre des d\u00e9cisions \u00e9clair\u00e9es sur leurs politiques d&rsquo;acc\u00e8s au r\u00e9seau.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h5>Int\u00e9gration de l&rsquo;\u00e9cosyst\u00e8me<\/h5>\n<p>ExtremeControl est int\u00e9gr\u00e9 \u00e0 l&rsquo;\u00e9cosyst\u00e8me de partenaires d&rsquo;Extreme Networks afin d&rsquo;\u00e9tendre la s\u00e9curit\u00e9 du r\u00e9seau et la r\u00e9ponse aux menaces. Par exemple, ExtremeControl s&rsquo;int\u00e8gre aux solutions de pare-feu de nouvelle g\u00e9n\u00e9ration et peut orchestrer l&rsquo;isolation des points d&rsquo;extr\u00e9mit\u00e9 et la rem\u00e9diation en fonction des alertes re\u00e7ues. Il partage des informations contextuelles telles que les utilisateurs, l&rsquo;adresse IP et la localisation pour une application puissante des politiques sur les pare-feux p\u00e9rim\u00e9triques. Les politiques bas\u00e9es sur le mappage ID-IP permettent de suivre les utilisateurs. ExtremeControl prend \u00e9galement en charge les politiques de tiers par le biais d&rsquo;ACL bas\u00e9es sur l&rsquo;utilisateur, ce qui permet un contr\u00f4le granulaire sur l&rsquo;ensemble du r\u00e9seau. Pour emp\u00eacher les appareils non conformes et non enregistr\u00e9s d&rsquo;acc\u00e9der au r\u00e9seau d&rsquo;un client, l&rsquo;int\u00e9gration avec les partenaires EMM\/MDM existants tels que VMware Workspace ONE UEM (Airwatch), Citrix et Mobilelron a \u00e9t\u00e9 simplifi\u00e9e.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h5>Contr\u00f4le complet des politiques<\/h5>\n<p>ExtremeControl permet d&rsquo;appliquer des contr\u00f4les d\u00e9taill\u00e9s aux utilisateurs et aux terminaux autoris\u00e9s sur le r\u00e9seau. Les utilisateurs peuvent s\u00e9curiser le BYOD, l&rsquo;acc\u00e8s des invit\u00e9s et le loT en d\u00e9ployant des politiques en temps r\u00e9el bas\u00e9es sur l&rsquo;\u00e9tat de s\u00e9curit\u00e9 des appareils. ExtremeControl associe les terminaux \u00e0 des attributs tels que l&rsquo;utilisateur, l&rsquo;heure, l&#8217;emplacement, la vuln\u00e9rabilit\u00e9 ou le type d&rsquo;acc\u00e8s, afin de cr\u00e9er une identit\u00e9 contextuelle compl\u00e8te. Les identit\u00e9s bas\u00e9es sur les r\u00f4les permettent de suivre un utilisateur ind\u00e9pendamment du lieu ou de la mani\u00e8re dont il se connecte au r\u00e9seau. Elles peuvent \u00eatre utilis\u00e9es pour appliquer des politiques d&rsquo;acc\u00e8s hautement s\u00e9curis\u00e9es afin d&#8217;emp\u00eacher les utilisateurs non autoris\u00e9s et les points d&rsquo;extr\u00e9mit\u00e9 compromis d&rsquo;acc\u00e9der au r\u00e9seau.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=\u00a0\u00bb\u00a0\u00bb row_type=\u00a0\u00bbrow\u00a0\u00bb use_row_as_full_screen_section=\u00a0\u00bbno\u00a0\u00bb type=\u00a0\u00bbfull_width\u00a0\u00bb angled_section=\u00a0\u00bbno\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb background_image_as_pattern=\u00a0\u00bbwithout_pattern\u00a0\u00bb][vc_column][vc_column_text]<\/p>\n<h4><strong>Vous voulez en savoir plus sur ExtremeControl ?<\/strong><\/h4>\n<p>Vous voulez en savoir plus sur ExtremeControl pour ExtremeCloud IQ &#8211; Site Engine ? Consultez <a href=\"https:\/\/www.extremenetworks.com\/products\/network-access-control\/extremecontrol\/extremecontrol\">ce site web<\/a> ou les fiches techniques pour plus d&rsquo;informations.[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=\u00a0\u00bb\u00a0\u00bb row_type=\u00a0\u00bbrow\u00a0\u00bb use_row_as_full_screen_section=\u00a0\u00bbno\u00a0\u00bb type=\u00a0\u00bbfull_width\u00a0\u00bb angled_section=\u00a0\u00bbno\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb background_image_as_pattern=\u00a0\u00bbwithout_pattern\u00a0\u00bb][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\u00a0\u00bb\u00a0\u00bb row_type=\u00a0\u00bbrow\u00a0\u00bb use_row_as_full_screen_section=\u00a0\u00bbno\u00a0\u00bb type=\u00a0\u00bbfull_width\u00a0\u00bb angled_section=\u00a0\u00bbno\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb background_image_as_pattern=\u00a0\u00bbwithout_pattern\u00a0\u00bb][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\u00a0\u00bb\u00a0\u00bb row_type=\u00a0\u00bbrow\u00a0\u00bb use_row_as_full_screen_section=\u00a0\u00bbno\u00a0\u00bb type=\u00a0\u00bbfull_width\u00a0\u00bb angled_section=\u00a0\u00bbno\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb background_image_as_pattern=\u00a0\u00bbwithout_pattern\u00a0\u00bb][vc_column]<a  itemprop=\"url\" href=\"https:\/\/www.kappadata.be\/wp-content\/uploads\/2023\/08\/ExtremeCloud-IQ-Site-Engine-Presentation.pdf\" target=\"_blank\"  class=\"qbutton  default\" style=\"\">ExtremeCloud IQ Site-Engine<\/a>[\/vc_column][\/vc_row][vc_row css_animation=\u00a0\u00bb\u00a0\u00bb row_type=\u00a0\u00bbrow\u00a0\u00bb use_row_as_full_screen_section=\u00a0\u00bbno\u00a0\u00bb type=\u00a0\u00bbfull_width\u00a0\u00bb angled_section=\u00a0\u00bbno\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb background_image_as_pattern=\u00a0\u00bbwithout_pattern\u00a0\u00bb][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\u00a0\u00bb\u00a0\u00bb row_type=\u00a0\u00bbrow\u00a0\u00bb use_row_as_full_screen_section=\u00a0\u00bbno\u00a0\u00bb type=\u00a0\u00bbfull_width\u00a0\u00bb angled_section=\u00a0\u00bbno\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb background_image_as_pattern=\u00a0\u00bbwithout_pattern\u00a0\u00bb][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\u00a0\u00bb\u00a0\u00bb row_type=\u00a0\u00bbrow\u00a0\u00bb use_row_as_full_screen_section=\u00a0\u00bbno\u00a0\u00bb type=\u00a0\u00bbfull_width\u00a0\u00bb angled_section=\u00a0\u00bbno\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb background_image_as_pattern=\u00a0\u00bbwithout_pattern\u00a0\u00bb][vc_column]<a  itemprop=\"url\" href=\"https:\/\/www.kappadata.be\/wp-content\/uploads\/2023\/08\/ExtremeControl-DS-ExtremeControl1en-USExtreme-Datasheet.pdf\" target=\"_blank\"  class=\"qbutton  default\" style=\"\">ExtremeControl Datasheet<\/a>[\/vc_column][\/vc_row][vc_row css_animation=\u00a0\u00bb\u00a0\u00bb row_type=\u00a0\u00bbrow\u00a0\u00bb use_row_as_full_screen_section=\u00a0\u00bbno\u00a0\u00bb type=\u00a0\u00bbfull_width\u00a0\u00bb angled_section=\u00a0\u00bbno\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb background_image_as_pattern=\u00a0\u00bbwithout_pattern\u00a0\u00bb][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\u00a0\u00bb\u00a0\u00bb row_type=\u00a0\u00bbrow\u00a0\u00bb use_row_as_full_screen_section=\u00a0\u00bbno\u00a0\u00bb type=\u00a0\u00bbfull_width\u00a0\u00bb angled_section=\u00a0\u00bbno\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb background_image_as_pattern=\u00a0\u00bbwithout_pattern\u00a0\u00bb][vc_column][vc_column_text]<\/p>\n<h4>Vous avez des questions? Contactez nous!<\/h4>\n<p>N&rsquo;h\u00e9sitez pas \u00e0 nous contacter \u00e0 l&rsquo;adresse <a href=\"mailto:sales@kappadata.be\">sales@kappadata.be<\/a> si vous souhaitez obtenir de plus amples informations.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>ExtremeControl pour ExtremeCloud IQ &#8211; SiteEngine assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau gr\u00e2ce \u00e0 la s\u00e9curit\u00e9 du point final. D\u00e9couvrez comment il vous prot\u00e8ge des menaces externes dans cet article de blog.<\/p>\n","protected":false},"author":4,"featured_media":17343,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[76,72,74],"tags":[],"class_list":["post-17331","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actus","category-publications-fr","category-downloads-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ExtremeControl Network Access Control assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau! | Kappa Data<\/title>\n<meta name=\"description\" content=\"ExtremeControl pour ExtremeCloud IQ - SiteEngine assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau gr\u00e2ce \u00e0 la s\u00e9curit\u00e9 du point final. D\u00e9couvrez comment il vous prot\u00e8ge des menaces externes dans cet article de blog.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ExtremeControl Network Access Control assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau! | Kappa Data\" \/>\n<meta property=\"og:description\" content=\"ExtremeControl pour ExtremeCloud IQ - SiteEngine assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau gr\u00e2ce \u00e0 la s\u00e9curit\u00e9 du point final. D\u00e9couvrez comment il vous prot\u00e8ge des menaces externes dans cet article de blog.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/\" \/>\n<meta property=\"og:site_name\" content=\"info@lincelot.com\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-11T12:24:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.kappadata.be\/wp-content\/uploads\/2023\/08\/Blogpost-Extreme-Control-NAC-01.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2462\" \/>\n\t<meta property=\"og:image:height\" content=\"1641\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jolien\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jolien\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.kappadata.be\\\/fr\\\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.kappadata.be\\\/fr\\\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\\\/\"},\"author\":{\"name\":\"Jolien\",\"@id\":\"https:\\\/\\\/www.kappadata.be\\\/#\\\/schema\\\/person\\\/58c0356f0fe82ad9238b1f73cf1e7fd9\"},\"headline\":\"ExtremeControl Network Access Control assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau!\",\"datePublished\":\"2023-08-11T12:24:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.kappadata.be\\\/fr\\\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\\\/\"},\"wordCount\":1733,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.kappadata.be\\\/fr\\\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.kappadata.be\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Blogpost-Extreme-Control-NAC-01.jpg\",\"articleSection\":[\"Actus\",\"publications\",\"T\u00e9l\u00e9chargements\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.kappadata.be\\\/fr\\\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.kappadata.be\\\/fr\\\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\\\/\",\"url\":\"https:\\\/\\\/www.kappadata.be\\\/fr\\\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\\\/\",\"name\":\"ExtremeControl Network Access Control assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau! | Kappa Data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.kappadata.be\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.kappadata.be\\\/fr\\\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.kappadata.be\\\/fr\\\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.kappadata.be\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Blogpost-Extreme-Control-NAC-01.jpg\",\"datePublished\":\"2023-08-11T12:24:09+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.kappadata.be\\\/#\\\/schema\\\/person\\\/58c0356f0fe82ad9238b1f73cf1e7fd9\"},\"description\":\"ExtremeControl pour ExtremeCloud IQ - SiteEngine assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau gr\u00e2ce \u00e0 la s\u00e9curit\u00e9 du point final. D\u00e9couvrez comment il vous prot\u00e8ge des menaces externes dans cet article de blog.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.kappadata.be\\\/fr\\\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.kappadata.be\\\/fr\\\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.kappadata.be\\\/fr\\\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.kappadata.be\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Blogpost-Extreme-Control-NAC-01.jpg\",\"contentUrl\":\"https:\\\/\\\/www.kappadata.be\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Blogpost-Extreme-Control-NAC-01.jpg\",\"width\":2462,\"height\":1641,\"caption\":\"Extreme Networks - Extreme Control\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.kappadata.be\\\/fr\\\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.kappadata.be\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ExtremeControl Network Access Control assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.kappadata.be\\\/#website\",\"url\":\"https:\\\/\\\/www.kappadata.be\\\/\",\"name\":\"info@lincelot.com\",\"description\":\"The Art of IT-infrastucture, security an IoT distribution\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.kappadata.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.kappadata.be\\\/#\\\/schema\\\/person\\\/58c0356f0fe82ad9238b1f73cf1e7fd9\",\"name\":\"Jolien\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2051aee62862901057fda881b5fd4ed96a68b9bfb670bf512659aadea6e2ee17?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2051aee62862901057fda881b5fd4ed96a68b9bfb670bf512659aadea6e2ee17?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2051aee62862901057fda881b5fd4ed96a68b9bfb670bf512659aadea6e2ee17?s=96&d=mm&r=g\",\"caption\":\"Jolien\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ExtremeControl Network Access Control assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau! | Kappa Data","description":"ExtremeControl pour ExtremeCloud IQ - SiteEngine assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau gr\u00e2ce \u00e0 la s\u00e9curit\u00e9 du point final. D\u00e9couvrez comment il vous prot\u00e8ge des menaces externes dans cet article de blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/","og_locale":"fr_FR","og_type":"article","og_title":"ExtremeControl Network Access Control assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau! | Kappa Data","og_description":"ExtremeControl pour ExtremeCloud IQ - SiteEngine assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau gr\u00e2ce \u00e0 la s\u00e9curit\u00e9 du point final. D\u00e9couvrez comment il vous prot\u00e8ge des menaces externes dans cet article de blog.","og_url":"https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/","og_site_name":"info@lincelot.com","article_published_time":"2023-08-11T12:24:09+00:00","og_image":[{"width":2462,"height":1641,"url":"https:\/\/www.kappadata.be\/wp-content\/uploads\/2023\/08\/Blogpost-Extreme-Control-NAC-01.jpg","type":"image\/jpeg"}],"author":"Jolien","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Jolien","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/#article","isPartOf":{"@id":"https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/"},"author":{"name":"Jolien","@id":"https:\/\/www.kappadata.be\/#\/schema\/person\/58c0356f0fe82ad9238b1f73cf1e7fd9"},"headline":"ExtremeControl Network Access Control assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau!","datePublished":"2023-08-11T12:24:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/"},"wordCount":1733,"commentCount":0,"image":{"@id":"https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/#primaryimage"},"thumbnailUrl":"https:\/\/www.kappadata.be\/wp-content\/uploads\/2023\/08\/Blogpost-Extreme-Control-NAC-01.jpg","articleSection":["Actus","publications","T\u00e9l\u00e9chargements"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/","url":"https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/","name":"ExtremeControl Network Access Control assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau! | Kappa Data","isPartOf":{"@id":"https:\/\/www.kappadata.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/#primaryimage"},"image":{"@id":"https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/#primaryimage"},"thumbnailUrl":"https:\/\/www.kappadata.be\/wp-content\/uploads\/2023\/08\/Blogpost-Extreme-Control-NAC-01.jpg","datePublished":"2023-08-11T12:24:09+00:00","author":{"@id":"https:\/\/www.kappadata.be\/#\/schema\/person\/58c0356f0fe82ad9238b1f73cf1e7fd9"},"description":"ExtremeControl pour ExtremeCloud IQ - SiteEngine assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau gr\u00e2ce \u00e0 la s\u00e9curit\u00e9 du point final. D\u00e9couvrez comment il vous prot\u00e8ge des menaces externes dans cet article de blog.","breadcrumb":{"@id":"https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/#primaryimage","url":"https:\/\/www.kappadata.be\/wp-content\/uploads\/2023\/08\/Blogpost-Extreme-Control-NAC-01.jpg","contentUrl":"https:\/\/www.kappadata.be\/wp-content\/uploads\/2023\/08\/Blogpost-Extreme-Control-NAC-01.jpg","width":2462,"height":1641,"caption":"Extreme Networks - Extreme Control"},{"@type":"BreadcrumbList","@id":"https:\/\/www.kappadata.be\/fr\/extremecontrol-network-access-control-assure-la-securite-de-la-peripherie-de-votre-reseau\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kappadata.be\/fr\/"},{"@type":"ListItem","position":2,"name":"ExtremeControl Network Access Control assure la s\u00e9curit\u00e9 de la p\u00e9riph\u00e9rie de votre r\u00e9seau!"}]},{"@type":"WebSite","@id":"https:\/\/www.kappadata.be\/#website","url":"https:\/\/www.kappadata.be\/","name":"info@lincelot.com","description":"The Art of IT-infrastucture, security an IoT distribution","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kappadata.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.kappadata.be\/#\/schema\/person\/58c0356f0fe82ad9238b1f73cf1e7fd9","name":"Jolien","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/2051aee62862901057fda881b5fd4ed96a68b9bfb670bf512659aadea6e2ee17?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2051aee62862901057fda881b5fd4ed96a68b9bfb670bf512659aadea6e2ee17?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2051aee62862901057fda881b5fd4ed96a68b9bfb670bf512659aadea6e2ee17?s=96&d=mm&r=g","caption":"Jolien"}}]}},"_links":{"self":[{"href":"https:\/\/www.kappadata.be\/fr\/wp-json\/wp\/v2\/posts\/17331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kappadata.be\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kappadata.be\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kappadata.be\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kappadata.be\/fr\/wp-json\/wp\/v2\/comments?post=17331"}],"version-history":[{"count":2,"href":"https:\/\/www.kappadata.be\/fr\/wp-json\/wp\/v2\/posts\/17331\/revisions"}],"predecessor-version":[{"id":17352,"href":"https:\/\/www.kappadata.be\/fr\/wp-json\/wp\/v2\/posts\/17331\/revisions\/17352"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kappadata.be\/fr\/wp-json\/wp\/v2\/media\/17343"}],"wp:attachment":[{"href":"https:\/\/www.kappadata.be\/fr\/wp-json\/wp\/v2\/media?parent=17331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kappadata.be\/fr\/wp-json\/wp\/v2\/categories?post=17331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kappadata.be\/fr\/wp-json\/wp\/v2\/tags?post=17331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}