[{"id":"ci_0a9bc4fea049e2e9be89cbd1aa0957a670066092bb29ac1ddd5484271853040e","title":"Déploiement sécurisé de MyQ X","path":"/fr/security/1.0/secure-deployment","children":[{"id":"ci_087398a866add9bca09734b69a83af090dfb07e5f248e0d74b6af791946a41c8","title":"MyQ X Central Server","path":"/fr/security/1.0/myq-central-server","children":[{"id":"ci_0750249f3593150390881295f19468b71a3e7269e9c66935a6bf68271c6437ac","title":"Sécurité des connexions","path":"/fr/security/1.0/connection-security","children":[]},{"id":"ci_a74674bdf790825178105e96795ae7c5f66d3015e41a3e4cae1fb0020d6a336d","title":"Sécurité des données","path":"/fr/security/1.0/data-security","children":[]},{"id":"ci_faf2ae0e8732238a5b302a771c1a646f2c144b375bead448cb0ea518ea000aae","title":"Recommandations supplémentaires","path":"/fr/security/1.0/additional-recommendations","children":[]}]},{"id":"ci_8c5194abfeb29148a772b5573140872aa14e16dc2079bd2261c73297456abfa0","title":"Serveur d’impression MyQ X","path":"/fr/security/1.0/myq-print-server","children":[{"id":"ci_72132b391fc9a835fcdbf17f49796484048921fbc1c3bc662d52f557bd9d48f7","title":"PS Sécurité de la connexion","path":"/fr/security/1.0/ps-connection-security","children":[]},{"id":"ci_226e22d8fd90b366cf30a9e9e3e8cfc82d5ddeb1e8fd2ad275d3d940fa8e7cba","title":"PS Sécurité des données","path":"/fr/security/1.0/ps-data-security","children":[]},{"id":"ci_706f9e2e6d18811da332da653e27ef3489ceebaa2c630f4b9b857600a8b91b5b","title":"PS Recommandations supplémentaires","path":"/fr/security/1.0/ps-additional-recommendations","children":[]}]},{"id":"ci_0ee9adf2fb94ddbfdd1fec2d3d951afb57e4e8aa6e13023368f58486ca73043c","title":"MyQ X Desktop Client","path":"/fr/security/1.0/myq-desktop-client","children":[]}]},{"id":"ci_c9ebd7416e86429a4b619513642cc0092cf27347e25401228a37ee9a187c7b7a","title":"Livre blanc sur la sécurité de MyQ X","path":"/fr/security/1.0/security-whitepaper","children":[{"id":"ci_e1c2dc0611f8bbebf7488bdc2774d9f672e67021e8f8ea5a2f6c0e728f9e9601","title":"Principales améliorations de la sécurité dans la version 10.2","path":"/fr/security/1.0/key-security-improvements-in-10-2","children":[]},{"id":"ci_7bc2bc912d5677f662aedf09e2705fee149143e93a85dc340eead02c228029dc","title":"Valeur commerciale de la gestion sécurisée des impressions","path":"/fr/security/1.0/business-value-of-secure-print-management","children":[]},{"id":"ci_92dfaf022171d240bf575153a3b19e59d276847312bce97af00fc842882370d2","title":"Conformité","path":"/fr/security/1.0/compliance","children":[]},{"id":"ci_105795e48a9888db3f06950e8416c2de49a1a1a2b7eee4f244fb0e703560d150","title":"Mise en œuvre de l’architecture de confiance zéro","path":"/fr/security/1.0/zero-trust-architecture-implementation","children":[]},{"id":"ci_7ae5ef8986c0e6723941a2c17ae652b157ab3c966014e15c5fa1a5e8e6ade04d","title":"Gestion des identités et des accès","path":"/fr/security/1.0/identity-and-access-management","children":[]},{"id":"ci_e15012da1dface446b908e08d59ad62d5cf8cf6a0be3affec25ddfccdd247774","title":"Sécurité des infrastructures","path":"/fr/security/1.0/infrastructure-security","children":[]},{"id":"ci_336da59da8e2ac2be34a7b7506b386e95441a6722e2a1ec2173f7298def5881c","title":"Protection des données et cryptage","path":"/fr/security/1.0/data-protection-and-encryption","children":[]},{"id":"ci_025975f78eddfcd6901d15f7f935bab09880bc61b3c7a00c66f86e09b232c114","title":"Flux d’impression sécurisés","path":"/fr/security/1.0/secure-printing-workflows","children":[]},{"id":"ci_6d7477d573ed29f74b023afb789019ae03d5051bb1ab5aa332fa036765520fd8","title":"Sécurité des périphériques et des réseaux","path":"/fr/security/1.0/device-and-network-security","children":[]},{"id":"ci_9a177f72461d68983804b04d59eaa138f9ed69fd40b7632c31c507a7825396b5","title":"Audit et suivi","path":"/fr/security/1.0/audit-and-monitoring","children":[]},{"id":"ci_6a22c7a33e0a35ea948975758768de8e4763f7d7fde436b56b583ceab36e5c4d","title":"Réponse aux incidents et récupération","path":"/fr/security/1.0/incident-response-and-recovery","children":[]}]},{"id":"ci_90d699ee9a6c4bdf0e986861c385daad7d93b26e241315fcb3ec5a0cb9efa8db","title":"MyQ X et NIS2","path":"/fr/security/1.0/myq-x-and-nis2","children":[]},{"id":"ci_2126937396c4cf30be4a2e7e2a1dd02251e933ac9e45c96ab8d33ba0dc3c0dac","title":"Nomenclature des logiciels","path":"/fr/security/1.0/software-bill-of-materials","children":[]}]