{"id":6932,"date":"2021-07-08T14:24:00","date_gmt":"2021-07-08T12:24:00","guid":{"rendered":"https:\/\/www.riviera-networks.com\/?p=6932"},"modified":"2021-08-30T11:37:31","modified_gmt":"2021-08-30T09:37:31","slug":"network-access-control","status":"publish","type":"post","link":"https:\/\/www.riviera-networks.com\/en\/network-access-control\/","title":{"rendered":"Network Access Control &#8211; le monde complexe de la s\u00e9curisation r\u00e9seau rendu simple"},"content":{"rendered":"<p class=\"has-text-align-center\"><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"311\" class=\"wp-image-6612\" style=\"width: 600px;\" src=\"https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/internet-3563638_1920.jpg?resize=600%2C311&#038;ssl=1\" alt=\"NAC\" srcset=\"https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/internet-3563638_1920.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/internet-3563638_1920.jpg?resize=300%2C156&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/internet-3563638_1920.jpg?resize=1024%2C531&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/internet-3563638_1920.jpg?resize=768%2C398&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/internet-3563638_1920.jpg?resize=1536%2C797&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/internet-3563638_1920.jpg?resize=16%2C8&amp;ssl=1 16w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n\n\n\n<p>Avec la croissance exponentielles des terminaux mobiles et des risques qu&rsquo;ils comportent, les entreprises ont besoins de visibilit\u00e9, de restrictions et de contr\u00f4le sur les appareils se connectants \u00e0 leur r\u00e9seau.<\/p>\n\n\n\n<p>Le Network Access Control (NAC) ou Contr\u00f4leur d&rsquo;acc\u00e8s r\u00e9seau en fran\u00e7ais, est une m\u00e9thode informatique qui permet l&rsquo;authentification de l&rsquo;utilisateur, de sa machine, et l&rsquo;application des r\u00e8gles de s\u00e9curit\u00e9 r\u00e9seau auxquelles ils sont soumis.<\/p>\n\n\n\n<p>Il limite la connexion aux appareils autoris\u00e9s qui respectent les r\u00e8gles de s\u00e9curit\u00e9s d\u00e9finies, dans le but de pr\u00e9venir d&rsquo;\u00e9ventuelles failles de s\u00e9curit\u00e9 (exemple: seuls les appareils poss\u00e9dants la mise \u00e0 jour 20H4 de Windows 10 peuvent se connecter).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Comment \u00e7a marche ?<\/h3>\n\n\n\n<p>Lorsque vous connectez un ordinateur \u00e0 un r\u00e9seau informatique, vous devez vous conformer \u00e0 des r\u00e8gles d\u00e9finies par l\u2019entreprise pour acc\u00e9der \u00e0 n&rsquo;importe qu&rsquo;elle ressource.<\/p>\n\n\n\n<p>L&rsquo;appareil est contr\u00f4l\u00e9 par un logiciel. Si celui-ci ne les respecte pas, soit il est rejet\u00e9, soit accept\u00e9 mais avec un acc\u00e8s limit\u00e9. Il ne pourrait par exemple, acc\u00e9der qu\u2019aux ressources qui peuvent le mettre en conformit\u00e9.<\/p>\n\n\n\n<p>Une fois la strat\u00e9gie respect\u00e9e, l&rsquo;ordinateur est en mesure d\u2019acc\u00e9der \u00e0 Internet et aux ressources r\u00e9seaux d\u00e9finies dans les strat\u00e9gies g\u00e9r\u00e9es par le syst\u00e8me de NAC.<\/p>\n\n\n\n<p>Le NAC est donc utilis\u00e9 pour contr\u00f4ler les \u00e9quipements finaux (PC, t\u00e9l\u00e9phone, etc). Il peut cependant affecter des restrictions d&rsquo;acc\u00e8s en fonction des r\u00f4les des utilisateurs. Par exemple, dans une entreprise, le service comptabilit\u00e9 ne devrait avoir qu&rsquo;acc\u00e8s aux fichiers concernant ce service. Cela est contr\u00f4lable gr\u00e2ce au NAC.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">L\u2019objectif du NAC<\/h3>\n\n\n\n<p>\u00c9tant donn\u00e9 que NAC est une cat\u00e9gorie \u00e9mergente de produits de s\u00e9curit\u00e9, sa d\u00e9finition est en constante \u00e9volution, mais nous pouvons convenir que les objectifs du concept sont:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>L&rsquo;Int\u00e9gration \u00e0 d&rsquo;autres solutions de s\u00e9curit\u00e9 r\u00e9seau <\/strong>via une API ouverte\/RESTful;<\/li><li><strong>L&rsquo;Automatisation via d\u2019autres outils<\/strong> &#8211; pour d\u00e9finir les strat\u00e9gies en fonction d\u2019autres informations telles que les vuln\u00e9rabilit\u00e9s connues, l\u2019\u00e9tat des patchs etc;<\/li><li><strong>La pr\u00e9vention &#8211;<\/strong> &nbsp;Il att\u00e9nue les menaces r\u00e9seau en appliquant des strat\u00e9gies de s\u00e9curit\u00e9 qui bloquent et isolent les machines non conformes sans l\u2019attention de l\u2019administrateur;<\/li><li><strong>L\u2019att\u00e9nuation des impacts des attaques zero-day<\/strong>;<\/li><li><strong>L&rsquo;Autorisation et l&rsquo;authentification des connexions<\/strong> : Il peut g\u00e9rer les invit\u00e9s via un portail libre-service personnalisable qui inclut leur enregistrement, leur authentification et leur administration gr\u00e2ce \u00e0 un portail de gestion des invit\u00e9s;<\/li><li><strong>Le Chiffrement du trafic sans fil et filaire<\/strong>;<\/li><li><strong>L&rsquo;Identification des utilisateurs<\/strong> et des appareils; et leur contr\u00f4le en \u00e9valuant la conformit\u00e9 aux strat\u00e9gies de s\u00e9curit\u00e9 par utilisateur, type d\u2019appareil ou encore syst\u00e8me d\u2019exploitation;<\/li><li><strong>L&rsquo;Application des r\u00e8gles<\/strong> : applique les r\u00e8gles et les strat\u00e9gies de s\u00e9curit\u00e9, pour tous les sc\u00e9narios d\u2019exploitation, sans n\u00e9cessiter de produits distincts ou de modules suppl\u00e9mentaires;<\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p>De nombreuses organisations sont guid\u00e9es par une approche <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/what-is-network-access-control-nac.html\">zero trust <\/a>en terme de s\u00e9curit\u00e9, et souhaitent contr\u00f4ler les appareils et les utilisateurs qui acc\u00e8dent au r\u00e9seau.<\/p>\n\n\n\n<p>NAC est une technologie mature qui aide \u00e0 satisfaire la plupart des besoins organisationnels avec des solutions commerciales et open source.<\/p>\n\n\n\n<h3 class=\"has-text-align-center wp-block-heading\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"400\" height=\"225\" class=\"wp-image-6613\" style=\"width: 400px;\" src=\"https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/laptop-1209008_1280.jpg?resize=400%2C225&#038;ssl=1\" alt=\"NAC BYOD\" srcset=\"https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/laptop-1209008_1280.jpg?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/laptop-1209008_1280.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/laptop-1209008_1280.jpg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/laptop-1209008_1280.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/laptop-1209008_1280.jpg?resize=16%2C9&amp;ssl=1 16w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Cas d\u2019utilisation les plus courants pour du NAC:<\/h3>\n\n\n\n<p><strong>-NAC appliqu\u00e9 au BYOD- <\/strong>\u00ab\u00a0Apportez votre propre appareil\u00a0\u00bb est la nouvelle fa\u00e7on de travailler, avec de plus en plus de gens travaillant \u00e0 distance et \u00e9tant lib\u00e9r\u00e9s de leur bureau. Le NAC appliqu\u00e9 au BYOD s\u2019assure que tous les p\u00e9riph\u00e9riques appartenant aux employ\u00e9s sont conformes aux strat\u00e9gies avant d\u2019acc\u00e9der au r\u00e9seau;<\/p>\n\n\n\n<p>&nbsp;<strong>-NAC pour les invit\u00e9s\/ entrepreneurs- <\/strong>Les organisations utilisent les solutions du CNA pour s\u2019assurer que les visiteurs, les partenaires ou les entrepreneurs ont des privil\u00e8ges d\u2019acc\u00e8s au r\u00e9seau qui sont s\u00e9par\u00e9s de ceux des employ\u00e9s;<\/p>\n\n\n\n<p>&nbsp;<strong>-NAC pour l\u2019Internet des objets- <\/strong>Les appareils IoT connaissent une croissance exponentielle dans de nombreux domaines tels que la sant\u00e9, et constituent des points d\u2019entr\u00e9e alternatifs pour les attaquants afin de p\u00e9n\u00e9trer dans le r\u00e9seau. Le NAC r\u00e9duit ces risques en appliquant des strat\u00e9gies d\u2019acc\u00e8s suivant les diff\u00e9rentes cat\u00e9gories de p\u00e9riph\u00e9riques;<\/p>\n\n\n\n<p>&nbsp;<strong>-NAC pour les dispositifs m\u00e9dicaux- <\/strong>Il est de la plus haute importance d\u2019identifier les appareils entrant dans un r\u00e9seau converg\u00e9 afin d\u2019aider \u00e0 prot\u00e9ger les appareils et les dossiers m\u00e9dicaux contre les menaces et d\u2019am\u00e9liorer la s\u00e9curit\u00e9 des soins de sant\u00e9.<\/p>\n\n\n\n<p>&nbsp;Chez Riviera Networks, nous offrons des <a href=\"https:\/\/www.riviera-networks.com\/en\/solutions\/\">solutions<\/a> de s\u00e9curit\u00e9 complexes adapt\u00e9es aux besoins de votre entreprise et pouvons vous aider tout au long du processus de mise en \u0153uvre de la strat\u00e9gie de s\u00e9curit\u00e9 souhait\u00e9e. Pour plus d\u2019aide et d\u2019informations n\u2019h\u00e9sitez pas \u00e0 nous contacter \u00e0 contact@riviera-networks.com.<\/p>","protected":false},"excerpt":{"rendered":"<p>Avec la croissance exponentielles des terminaux mobiles et des risques qu&rsquo;ils comportent, les entreprises ont besoins de visibilit\u00e9, de restrictions et de contr\u00f4le sur les appareils se connectants \u00e0 leur r\u00e9seau. Le Network Access Control (NAC) ou Contr\u00f4leur d&rsquo;acc\u00e8s r\u00e9seau en fran\u00e7ais, est une m\u00e9thode informatique qui permet l&rsquo;authentification de [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20,21],"tags":[],"class_list":["post-6932","post","type-post","status-publish","format-standard","hentry","category-products-technologies","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Network Access Control Riviera Networks Inc<\/title>\n<meta name=\"description\" content=\"La croissance exponentielle des appareils mobiles et distants utilis\u00e9s sur le lieu de travail et les risques qu\u2019ils comportent, les entreprises ont besoin d\u2019outils qui fournissent la visibilit\u00e9, les capacit\u00e9s de conformit\u00e9 et le contr\u00f4le d\u2019acc\u00e8s n\u00e9cessaires \u00e0 une infrastructure de s\u00e9curit\u00e9 r\u00e9seau solide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riviera-networks.com\/en\/network-access-control\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Access Control Riviera Networks Inc\" \/>\n<meta property=\"og:description\" content=\"La croissance exponentielle des appareils mobiles et distants utilis\u00e9s sur le lieu de travail et les risques qu\u2019ils comportent, les entreprises ont besoin d\u2019outils qui fournissent la visibilit\u00e9, les capacit\u00e9s de conformit\u00e9 et le contr\u00f4le d\u2019acc\u00e8s n\u00e9cessaires \u00e0 une infrastructure de s\u00e9curit\u00e9 r\u00e9seau solide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riviera-networks.com\/en\/network-access-control\/\" \/>\n<meta property=\"og:site_name\" content=\"Riviera Networks Inc\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-08T12:24:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-30T09:37:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/internet-3563638_1920.jpg\" \/>\n<meta name=\"author\" content=\"Corina\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RivieraNetwrks\" \/>\n<meta name=\"twitter:site\" content=\"@RivieraNetwrks\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Corina\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/network-access-control\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/network-access-control\\\/\"},\"author\":{\"name\":\"Corina\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#\\\/schema\\\/person\\\/e7fb36ca9697b5c756c0fa17db888d12\"},\"headline\":\"Network Access Control &#8211; le monde complexe de la s\u00e9curisation r\u00e9seau rendu simple\",\"datePublished\":\"2021-07-08T12:24:00+00:00\",\"dateModified\":\"2021-08-30T09:37:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/network-access-control\\\/\"},\"wordCount\":882,\"publisher\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/network-access-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.riviera-networks.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/internet-3563638_1920.jpg\",\"articleSection\":[\"Products - Technologies\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/network-access-control\\\/\",\"url\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/network-access-control\\\/\",\"name\":\"Network Access Control Riviera Networks Inc\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/network-access-control\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/network-access-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.riviera-networks.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/internet-3563638_1920.jpg\",\"datePublished\":\"2021-07-08T12:24:00+00:00\",\"dateModified\":\"2021-08-30T09:37:31+00:00\",\"description\":\"La croissance exponentielle des appareils mobiles et distants utilis\u00e9s sur le lieu de travail et les risques qu\u2019ils comportent, les entreprises ont besoin d\u2019outils qui fournissent la visibilit\u00e9, les capacit\u00e9s de conformit\u00e9 et le contr\u00f4le d\u2019acc\u00e8s n\u00e9cessaires \u00e0 une infrastructure de s\u00e9curit\u00e9 r\u00e9seau solide.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/network-access-control\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/network-access-control\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/network-access-control\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.riviera-networks.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/internet-3563638_1920.jpg\",\"contentUrl\":\"https:\\\/\\\/www.riviera-networks.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/internet-3563638_1920.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/network-access-control\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Access Control &#8211; le monde complexe de la s\u00e9curisation r\u00e9seau rendu simple\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/\",\"name\":\"Riviera Networks Inc\",\"description\":\"Infrastructure Experts\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#organization\",\"name\":\"Riviera Networks Inc\",\"url\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.riviera-networks.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/rnilogo-white-bg1.png\",\"contentUrl\":\"https:\\\/\\\/www.riviera-networks.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/rnilogo-white-bg1.png\",\"width\":849,\"height\":299,\"caption\":\"Riviera Networks Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/RivieraNetwrks\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/riviera-networks\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#\\\/schema\\\/person\\\/e7fb36ca9697b5c756c0fa17db888d12\",\"name\":\"Corina\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f51511960974cab79d2a1f22d3fd2ec8b41e8cd26d449b7dfb7389f4cce214?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f51511960974cab79d2a1f22d3fd2ec8b41e8cd26d449b7dfb7389f4cce214?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f51511960974cab79d2a1f22d3fd2ec8b41e8cd26d449b7dfb7389f4cce214?s=96&d=mm&r=g\",\"caption\":\"Corina\"},\"sameAs\":[\"http:\\\/\\\/www.riviera-networks.com\"],\"url\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/author\\\/cpreoteasa\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Access Control Riviera Networks Inc","description":"La croissance exponentielle des appareils mobiles et distants utilis\u00e9s sur le lieu de travail et les risques qu\u2019ils comportent, les entreprises ont besoin d\u2019outils qui fournissent la visibilit\u00e9, les capacit\u00e9s de conformit\u00e9 et le contr\u00f4le d\u2019acc\u00e8s n\u00e9cessaires \u00e0 une infrastructure de s\u00e9curit\u00e9 r\u00e9seau solide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riviera-networks.com\/en\/network-access-control\/","og_locale":"en_US","og_type":"article","og_title":"Network Access Control Riviera Networks Inc","og_description":"La croissance exponentielle des appareils mobiles et distants utilis\u00e9s sur le lieu de travail et les risques qu\u2019ils comportent, les entreprises ont besoin d\u2019outils qui fournissent la visibilit\u00e9, les capacit\u00e9s de conformit\u00e9 et le contr\u00f4le d\u2019acc\u00e8s n\u00e9cessaires \u00e0 une infrastructure de s\u00e9curit\u00e9 r\u00e9seau solide.","og_url":"https:\/\/www.riviera-networks.com\/en\/network-access-control\/","og_site_name":"Riviera Networks Inc","article_published_time":"2021-07-08T12:24:00+00:00","article_modified_time":"2021-08-30T09:37:31+00:00","og_image":[{"url":"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/internet-3563638_1920.jpg","type":"","width":"","height":""}],"author":"Corina","twitter_card":"summary_large_image","twitter_creator":"@RivieraNetwrks","twitter_site":"@RivieraNetwrks","twitter_misc":{"Written by":"Corina","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riviera-networks.com\/en\/network-access-control\/#article","isPartOf":{"@id":"https:\/\/www.riviera-networks.com\/en\/network-access-control\/"},"author":{"name":"Corina","@id":"https:\/\/www.riviera-networks.com\/fr\/#\/schema\/person\/e7fb36ca9697b5c756c0fa17db888d12"},"headline":"Network Access Control &#8211; le monde complexe de la s\u00e9curisation r\u00e9seau rendu simple","datePublished":"2021-07-08T12:24:00+00:00","dateModified":"2021-08-30T09:37:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riviera-networks.com\/en\/network-access-control\/"},"wordCount":882,"publisher":{"@id":"https:\/\/www.riviera-networks.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.riviera-networks.com\/en\/network-access-control\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/internet-3563638_1920.jpg","articleSection":["Products - Technologies","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riviera-networks.com\/en\/network-access-control\/","url":"https:\/\/www.riviera-networks.com\/en\/network-access-control\/","name":"Network Access Control Riviera Networks Inc","isPartOf":{"@id":"https:\/\/www.riviera-networks.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riviera-networks.com\/en\/network-access-control\/#primaryimage"},"image":{"@id":"https:\/\/www.riviera-networks.com\/en\/network-access-control\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/internet-3563638_1920.jpg","datePublished":"2021-07-08T12:24:00+00:00","dateModified":"2021-08-30T09:37:31+00:00","description":"La croissance exponentielle des appareils mobiles et distants utilis\u00e9s sur le lieu de travail et les risques qu\u2019ils comportent, les entreprises ont besoin d\u2019outils qui fournissent la visibilit\u00e9, les capacit\u00e9s de conformit\u00e9 et le contr\u00f4le d\u2019acc\u00e8s n\u00e9cessaires \u00e0 une infrastructure de s\u00e9curit\u00e9 r\u00e9seau solide.","breadcrumb":{"@id":"https:\/\/www.riviera-networks.com\/en\/network-access-control\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riviera-networks.com\/en\/network-access-control\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riviera-networks.com\/en\/network-access-control\/#primaryimage","url":"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/internet-3563638_1920.jpg","contentUrl":"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2021\/05\/internet-3563638_1920.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riviera-networks.com\/en\/network-access-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.riviera-networks.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Network Access Control &#8211; le monde complexe de la s\u00e9curisation r\u00e9seau rendu simple"}]},{"@type":"WebSite","@id":"https:\/\/www.riviera-networks.com\/fr\/#website","url":"https:\/\/www.riviera-networks.com\/fr\/","name":"Riviera Networks Inc","description":"Infrastructure Experts","publisher":{"@id":"https:\/\/www.riviera-networks.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riviera-networks.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riviera-networks.com\/fr\/#organization","name":"Riviera Networks Inc","url":"https:\/\/www.riviera-networks.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riviera-networks.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2020\/04\/rnilogo-white-bg1.png","contentUrl":"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2020\/04\/rnilogo-white-bg1.png","width":849,"height":299,"caption":"Riviera Networks Inc"},"image":{"@id":"https:\/\/www.riviera-networks.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/RivieraNetwrks","https:\/\/www.linkedin.com\/company\/riviera-networks\/"]},{"@type":"Person","@id":"https:\/\/www.riviera-networks.com\/fr\/#\/schema\/person\/e7fb36ca9697b5c756c0fa17db888d12","name":"Corina","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/84f51511960974cab79d2a1f22d3fd2ec8b41e8cd26d449b7dfb7389f4cce214?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/84f51511960974cab79d2a1f22d3fd2ec8b41e8cd26d449b7dfb7389f4cce214?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/84f51511960974cab79d2a1f22d3fd2ec8b41e8cd26d449b7dfb7389f4cce214?s=96&d=mm&r=g","caption":"Corina"},"sameAs":["http:\/\/www.riviera-networks.com"],"url":"https:\/\/www.riviera-networks.com\/en\/author\/cpreoteasa\/"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/posts\/6932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/comments?post=6932"}],"version-history":[{"count":16,"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/posts\/6932\/revisions"}],"predecessor-version":[{"id":7890,"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/posts\/6932\/revisions\/7890"}],"wp:attachment":[{"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/media?parent=6932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/categories?post=6932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/tags?post=6932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}