[{"id":"ci_809cae26f4bbb8acf326ef746f3e377c7e7d3fd72f2ae89b05afbb86c507bddf","title":"MyQ X Secure Deployment","path":"/en/security/1.0/secure-deployment","children":[{"id":"ci_29ce158c224eced1c9a2b990f89e39cf073cc1cf7df079e1f1ba42193ec44395","title":"MyQ X Central Server","path":"/en/security/1.0/myq-central-server","children":[{"id":"ci_767b31778153412b5cbf25b586b0e1988c9e44469a23794eefa5079e1449f278","title":"Connection security","path":"/en/security/1.0/connection-security","children":[]},{"id":"ci_08ebd3bf77be93ac738dc992a9b1f3eca90b9a7f773172aa16e965874cd1411a","title":"Data security","path":"/en/security/1.0/data-security","children":[]},{"id":"ci_c65cd9d7f88ac836a6e1ec2beec64b83aa1799b1aa666317b517264e410bcebc","title":"Additional recommendations","path":"/en/security/1.0/additional-recommendations","children":[]}]},{"id":"ci_aeada0fd20a049aa768ba40e2632c1ebfc65d6e1a4ad6bc3040610269b4b87e9","title":"MyQ X Print Server","path":"/en/security/1.0/myq-print-server","children":[{"id":"ci_c476b019d1f05a1dca8fa132885fd3d99bdc1f8a71f44c286ce8204b5447dd94","title":"PS Connection security","path":"/en/security/1.0/ps-connection-security","children":[]},{"id":"ci_c20d68a081c92fa917f856d2aa1e265f308ae6b85d39323a71c2e5f08a416ee3","title":"PS Data security","path":"/en/security/1.0/ps-data-security","children":[]},{"id":"ci_304400a3deab574c5e1448b2510f8a58d58c6c2df8e160eb30e648ed9a2c9e4e","title":"PS Additional recommendations","path":"/en/security/1.0/ps-additional-recommendations","children":[]}]},{"id":"ci_e489ea0d1953824afda5fd601ea02aefeac3299ec8e0f0f19b3d81ca39c6b0db","title":"MyQ X Desktop Client","path":"/en/security/1.0/myq-desktop-client","children":[]}]},{"id":"ci_846f2498aa6176e1cf7b8334fa7ef2bb3730596d6c95f3b56a7bd7b4a9325a8c","title":"MyQ X Security Whitepaper","path":"/en/security/1.0/security-whitepaper","children":[{"id":"ci_1a48be95e365d0ae5e25084e779750370462f928111a7e7fa81b12a4cd1dfd96","title":"Key Security Improvements in 10.2","path":"/en/security/1.0/key-security-improvements-in-10-2","children":[]},{"id":"ci_a79e1860d17d5c22f79bed45e9e143323e467bbe3fa4789302434fb486c7547e","title":"Business Value of Secure Print Management","path":"/en/security/1.0/business-value-of-secure-print-management","children":[]},{"id":"ci_91af23a18bdbbc019e54a44c908b59bb23d066a24192d6afa3cbf706ad686598","title":"Compliance","path":"/en/security/1.0/compliance","children":[]},{"id":"ci_9b8534ed1bd9f0d50e01884e094c9b04d221b16fc7d4b7ecd0e89efebe6869ad","title":"Zero Trust Architecture Implementation","path":"/en/security/1.0/zero-trust-architecture-implementation","children":[]},{"id":"ci_b22d0fb775740a22aad918dfe62a5dbc4c96e6710787f63dc08a85289c05b0f0","title":"Identity and Access Management","path":"/en/security/1.0/identity-and-access-management","children":[]},{"id":"ci_8d8d147155f905b56d9d7385e9aa561a3c8e89338f3a5897cd9db73c22f93ce3","title":"Infrastructure Security","path":"/en/security/1.0/infrastructure-security","children":[]},{"id":"ci_aae9af010d2da89c85814236a638cb78bfeb51f8f3c0b4025022693c51624ee7","title":"Data Protection and Encryption","path":"/en/security/1.0/data-protection-and-encryption","children":[]},{"id":"ci_c4df205e3249831c6de8bccfaa4aaa5ff45fdb5d476ee71ae8a0ea71a2d6a605","title":"Secure Printing Workflows","path":"/en/security/1.0/secure-printing-workflows","children":[]},{"id":"ci_6a8afc872b4fc98b34cb31e734cb802ff184ff6dccfef508a07579d922b66b58","title":"Device and Network Security","path":"/en/security/1.0/device-and-network-security","children":[]},{"id":"ci_bda9755a4f6f0c64b736bbdd9ab3a0e43523ead60a4cd667f69adda80f06c09f","title":"Audit and Monitoring","path":"/en/security/1.0/audit-and-monitoring","children":[]},{"id":"ci_a487d24696526fe7471a7b61b30f2d778630dc96c97a7dcdcf5bdbd0bdfc4409","title":"Incident Response and Recovery","path":"/en/security/1.0/incident-response-and-recovery","children":[]}]},{"id":"ci_d242438e6ca1a729360b2b30f24b816a402ba3308c2a537881206756a0bf044f","title":"MyQ X and NIS2","path":"/en/security/1.0/myq-x-and-nis2","children":[]},{"id":"ci_6d3f9531bd294619c676c422f31d05a8167c222cdf7cdb9a8c619229cd12c5bc","title":"Software Bill of Materials","path":"/en/security/1.0/software-bill-of-materials","children":[]}]