{"id":412,"date":"2025-09-15T17:49:53","date_gmt":"2025-09-15T15:49:53","guid":{"rendered":"https:\/\/ingeflex.com\/?page_id=412"},"modified":"2026-04-01T06:46:11","modified_gmt":"2026-04-01T04:46:11","slug":"cybersecurite-resilience-robustesse-et-confiance","status":"publish","type":"page","link":"https:\/\/ingeflex.com\/index.php\/cybersecurite-resilience-robustesse-et-confiance\/","title":{"rendered":"Cybers\u00e9curit\u00e9 pour entreprises"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Anticipez les menaces avant qu\u2019elles ne vous impactent<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\">Les cyberattaques sont aujourd\u2019hui l\u2019un des principaux risques pour les entreprises.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">INGEFLEX vous aide \u00e0 prot\u00e9ger vos donn\u00e9es, vos syst\u00e8mes et votre activit\u00e9.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Nos prestations<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-medium-font-size\">Audit de s\u00e9curit\u00e9 complet<\/li>\n\n\n\n<li class=\"has-medium-font-size\">Tests de vuln\u00e9rabilit\u00e9<\/li>\n\n\n\n<li class=\"has-medium-font-size\">S\u00e9curisation des acc\u00e8s<\/li>\n\n\n\n<li class=\"has-medium-font-size\">Mise en conformit\u00e9<\/li>\n\n\n\n<li class=\"has-medium-font-size\">Surveillance continue<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Nos prestations<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-medium-font-size\">Audit de s\u00e9curit\u00e9 complet<\/li>\n\n\n\n<li class=\"has-medium-font-size\">Tests de vuln\u00e9rabilit\u00e9<\/li>\n\n\n\n<li class=\"has-medium-font-size\">S\u00e9curisation des acc\u00e8s<\/li>\n\n\n\n<li class=\"has-medium-font-size\">Mise en conformit\u00e9<\/li>\n\n\n\n<li class=\"has-medium-font-size\">Surveillance continue<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">R\u00e9sultats<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-medium-font-size\">R\u00e9duction des risques<\/li>\n\n\n\n<li class=\"has-medium-font-size\">Protection des donn\u00e9es sensibles<\/li>\n\n\n\n<li class=\"has-medium-font-size\">Meilleure conformit\u00e9 r\u00e9glementaire<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\">\ud83d\udc49 <strong>Demander un audit s\u00e9curit\u00e9<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><\/h3>\n\n\n<ul class=\"has-excerpts wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0536\/'>Multiples vuln\u00e9rabilit\u00e9s dans Redis (06 mai 2026)<\/a><\/div><div class=\"wp-block-rss__item-excerpt\">De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Redis. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0535\/'>Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome (06 mai 2026)<\/a><\/div><div class=\"wp-block-rss__item-excerpt\">De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l&#039;\u00e9diteur.<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0538\/'>Multiples vuln\u00e9rabilit\u00e9s dans Asterisk (06 mai 2026)<\/a><\/div><div class=\"wp-block-rss__item-excerpt\">De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Asterisk. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0537\/'>Vuln\u00e9rabilit\u00e9 dans Palo Alto Networks User-ID Authentication Portal (06 mai 2026)<\/a><\/div><div class=\"wp-block-rss__item-excerpt\">Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Palo Alto Networks User-ID Authentication Portal. Elle permet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance. Palo Alto Networks indique que la vuln\u00e9rabilit\u00e9 CVE-2026-0300 est activement exploit\u00e9e. L&#039;\u00e9diteur indique que les&#8230;<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0539\/'>Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Secure Analytics (06 mai 2026)<\/a><\/div><div class=\"wp-block-rss__item-excerpt\">De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks Secure Analytics. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l&#039;\u00e9diteur.<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0540\/'>Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu Gemfire (06 mai 2026)<\/a><\/div><div class=\"wp-block-rss__item-excerpt\">De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu Gemfire. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l&#039;\u00e9diteur.<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0541\/'>Multiples vuln\u00e9rabilit\u00e9s dans Zabbix (06 mai 2026)<\/a><\/div><div class=\"wp-block-rss__item-excerpt\">De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Zabbix. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0542\/'>Multiples vuln\u00e9rabilit\u00e9s dans Progress Telerik (06 mai 2026)<\/a><\/div><div class=\"wp-block-rss__item-excerpt\">De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Progress Telerik. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0531\/'>Vuln\u00e9rabilit\u00e9 dans Traefik (05 mai 2026)<\/a><\/div><div class=\"wp-block-rss__item-excerpt\">Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Traefik. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0532\/'>Multiples vuln\u00e9rabilit\u00e9s dans Progress MOVEit Automation (05 mai 2026)<\/a><\/div><div class=\"wp-block-rss__item-excerpt\">De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Progress MOVEit Automation. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges et un contournement de la politique de s\u00e9curit\u00e9.<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0533\/'>Multiples vuln\u00e9rabilit\u00e9s dans Papercut (05 mai 2026)<\/a><\/div><div class=\"wp-block-rss__item-excerpt\">De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Papercut. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0534\/'>Vuln\u00e9rabilit\u00e9 dans Google Android (05 mai 2026)<\/a><\/div><div class=\"wp-block-rss__item-excerpt\">Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Google Android. Elle permet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0530\/'>Multiples vuln\u00e9rabilit\u00e9s dans Apache HTTP Server (05 mai 2026)<\/a><\/div><div class=\"wp-block-rss__item-excerpt\">De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Apache HTTP Server. Certaines d&#039;entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0529\/'>Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird (04 mai 2026)<\/a><\/div><div class=\"wp-block-rss__item-excerpt\">De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Thunderbird. Certaines d&#039;entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/avis\/CERTFR-2026-AVI-0528\/'>Vuln\u00e9rabilit\u00e9 dans Qnap QTS (04 mai 2026)<\/a><\/div><div class=\"wp-block-rss__item-excerpt\">Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Qnap QTS. Elle permet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.<\/div><\/li><\/ul>","protected":false},"excerpt":{"rendered":"<p>Anticipez les menaces avant qu\u2019elles ne vous impactent Les cyberattaques sont aujourd\u2019hui l\u2019un des principaux risques pour les entreprises. INGEFLEX vous aide \u00e0 prot\u00e9ger vos donn\u00e9es, vos syst\u00e8mes et votre activit\u00e9. Nos prestations Nos prestations R\u00e9sultats<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-412","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybers\u00e9curit\u00e9 entreprise | Audit &amp; protection | INGEFLEX<\/title>\n<meta name=\"description\" content=\"Prot\u00e9gez votre entreprise des cyberattaques. Audit de s\u00e9curit\u00e9, gestion des vuln\u00e9rabilit\u00e9s &amp; sauvegardes selon les derni\u00e8res directives\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ingeflex.com\/index.php\/cybersecurite-resilience-robustesse-et-confiance\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 entreprise | Audit &amp; protection | INGEFLEX\" \/>\n<meta property=\"og:description\" content=\"Prot\u00e9gez votre entreprise des cyberattaques. Audit de s\u00e9curit\u00e9, gestion des vuln\u00e9rabilit\u00e9s &amp; sauvegardes selon les derni\u00e8res directives\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ingeflex.com\/index.php\/cybersecurite-resilience-robustesse-et-confiance\/\" \/>\n<meta property=\"og:site_name\" content=\"INGEFLEX\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T04:46:11+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ingeflex.com\\\/index.php\\\/cybersecurite-resilience-robustesse-et-confiance\\\/\",\"url\":\"https:\\\/\\\/ingeflex.com\\\/index.php\\\/cybersecurite-resilience-robustesse-et-confiance\\\/\",\"name\":\"Cybers\u00e9curit\u00e9 entreprise | Audit & protection | INGEFLEX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ingeflex.com\\\/#website\"},\"datePublished\":\"2025-09-15T15:49:53+00:00\",\"dateModified\":\"2026-04-01T04:46:11+00:00\",\"description\":\"Prot\u00e9gez votre entreprise des cyberattaques. Audit de s\u00e9curit\u00e9, gestion des vuln\u00e9rabilit\u00e9s & sauvegardes selon les derni\u00e8res directives\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ingeflex.com\\\/index.php\\\/cybersecurite-resilience-robustesse-et-confiance\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ingeflex.com\\\/index.php\\\/cybersecurite-resilience-robustesse-et-confiance\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ingeflex.com\\\/index.php\\\/cybersecurite-resilience-robustesse-et-confiance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/ingeflex.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9 pour entreprises\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ingeflex.com\\\/#website\",\"url\":\"https:\\\/\\\/ingeflex.com\\\/\",\"name\":\"INGEFLEX\",\"description\":\"met en oeuvre votre cr\u00e9ativit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/ingeflex.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ingeflex.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ingeflex.com\\\/#organization\",\"name\":\"INGEFLEX\",\"url\":\"https:\\\/\\\/ingeflex.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/ingeflex.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ingeflex.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/ing-logosite.png\",\"contentUrl\":\"https:\\\/\\\/ingeflex.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/ing-logosite.png\",\"width\":512,\"height\":512,\"caption\":\"INGEFLEX\"},\"image\":{\"@id\":\"https:\\\/\\\/ingeflex.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 entreprise | Audit & protection | INGEFLEX","description":"Prot\u00e9gez votre entreprise des cyberattaques. Audit de s\u00e9curit\u00e9, gestion des vuln\u00e9rabilit\u00e9s & sauvegardes selon les derni\u00e8res directives","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ingeflex.com\/index.php\/cybersecurite-resilience-robustesse-et-confiance\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 entreprise | Audit & protection | INGEFLEX","og_description":"Prot\u00e9gez votre entreprise des cyberattaques. Audit de s\u00e9curit\u00e9, gestion des vuln\u00e9rabilit\u00e9s & sauvegardes selon les derni\u00e8res directives","og_url":"https:\/\/ingeflex.com\/index.php\/cybersecurite-resilience-robustesse-et-confiance\/","og_site_name":"INGEFLEX","article_modified_time":"2026-04-01T04:46:11+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ingeflex.com\/index.php\/cybersecurite-resilience-robustesse-et-confiance\/","url":"https:\/\/ingeflex.com\/index.php\/cybersecurite-resilience-robustesse-et-confiance\/","name":"Cybers\u00e9curit\u00e9 entreprise | Audit & protection | INGEFLEX","isPartOf":{"@id":"https:\/\/ingeflex.com\/#website"},"datePublished":"2025-09-15T15:49:53+00:00","dateModified":"2026-04-01T04:46:11+00:00","description":"Prot\u00e9gez votre entreprise des cyberattaques. Audit de s\u00e9curit\u00e9, gestion des vuln\u00e9rabilit\u00e9s & sauvegardes selon les derni\u00e8res directives","breadcrumb":{"@id":"https:\/\/ingeflex.com\/index.php\/cybersecurite-resilience-robustesse-et-confiance\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ingeflex.com\/index.php\/cybersecurite-resilience-robustesse-et-confiance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ingeflex.com\/index.php\/cybersecurite-resilience-robustesse-et-confiance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ingeflex.com\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9 pour entreprises"}]},{"@type":"WebSite","@id":"https:\/\/ingeflex.com\/#website","url":"https:\/\/ingeflex.com\/","name":"INGEFLEX","description":"met en oeuvre votre cr\u00e9ativit\u00e9","publisher":{"@id":"https:\/\/ingeflex.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ingeflex.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/ingeflex.com\/#organization","name":"INGEFLEX","url":"https:\/\/ingeflex.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ingeflex.com\/#\/schema\/logo\/image\/","url":"https:\/\/ingeflex.com\/wp-content\/uploads\/2021\/07\/ing-logosite.png","contentUrl":"https:\/\/ingeflex.com\/wp-content\/uploads\/2021\/07\/ing-logosite.png","width":512,"height":512,"caption":"INGEFLEX"},"image":{"@id":"https:\/\/ingeflex.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ingeflex.com\/index.php\/wp-json\/wp\/v2\/pages\/412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ingeflex.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ingeflex.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ingeflex.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ingeflex.com\/index.php\/wp-json\/wp\/v2\/comments?post=412"}],"version-history":[{"count":15,"href":"https:\/\/ingeflex.com\/index.php\/wp-json\/wp\/v2\/pages\/412\/revisions"}],"predecessor-version":[{"id":707,"href":"https:\/\/ingeflex.com\/index.php\/wp-json\/wp\/v2\/pages\/412\/revisions\/707"}],"wp:attachment":[{"href":"https:\/\/ingeflex.com\/index.php\/wp-json\/wp\/v2\/media?parent=412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}