{"id":352,"date":"2023-09-27T15:32:43","date_gmt":"2023-09-27T15:32:43","guid":{"rendered":"https:\/\/www.ignition-technology.com\/fr\/?page_id=352"},"modified":"2024-09-09T15:23:47","modified_gmt":"2024-09-09T15:23:47","slug":"blogs","status":"publish","type":"page","link":"https:\/\/www.ignition-technology.com\/fr\/blogs\/","title":{"rendered":"Blogs"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Ignition Blog<\/h1>\n<h5 style=\"text-align: center\"><span style=\"color: #fff\">All the Latest Cybersecurity Blogs from Ignition<\/span><\/h5>\n<p style=\"text-align: center\">Cybersecurity Blog<\/p>\n<p>May 2, 2023<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/05\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png\" alt=\"Blog thumbnail of a man pointing to whiteboard with sticky notes\" width=\"1500\" height=\"1500\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">May 2, 2023<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/building-an-identity-security-strategy\/\">How to Build a Comprehensive Identity Security Strategy<\/a><\/h6>\n<p>May 2, 2023<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/05\/identity-security-zero-trust-1.jpg\" alt=\"Blog thumbnail of a finger print\" width=\"1000\" height=\"1000\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">May 2, 2023<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/identity-security-and-zero-trust\/\">Understanding the Difference Between Identity Security &amp; Zero Trust<\/a><\/h6>\n<p>May 2, 2023<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/05\/Identity-Security-\u2013-Why-It-Matters.png\" alt=\"Blog thumbnail of a finger print\" width=\"1500\" height=\"1500\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">May 2, 2023<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/identity-security-why-it-matters\/\">Identity Security \u2013 Why It Matters<\/a><\/h6>\n<p>April 11, 2023<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/04\/taming-thr-cookie-monster.jpg\" alt=\"Blog thumbnail of an illustration of a Cookie Monster\" width=\"1000\" height=\"1000\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">April 11, 2023<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/taming-the-cookie-monster-with-mfa\/\">Taming The Cookie Monster With MFA<\/a><\/h6>\n<p>January 31, 2023<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/01\/Blogs-Thumbnails-05.png\" alt=\"Blog thumbnail of the Ignition and Abnormal logos\" width=\"1500\" height=\"1500\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">January 31, 2023<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/abnormal-blogs\/\" rel=\"category tag\">Abnormal Blogs<\/a><\/li>\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/how-abnormal-security-is-leveraging-ai\/\">How Abnormal Security Is Leveraging Artificial Intelligence<\/a><\/h6>\n<p>July 14, 2022<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2022\/07\/Blogs-Thumbnails-06.png\" alt=\"Blog thumbnail of the Ignition and BlackBerry logos\" width=\"1500\" height=\"1500\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">July 14, 2022<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/blackberry-blogs\/\" rel=\"category tag\">BlackBerry Blogs<\/a><\/li>\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/the-dark-side-of-pen-testing\/\">The Dark Side of Pen Testing<\/a><\/h6>\n<p>March 17, 2022<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2022\/03\/Cracking-the-Ransomware-Conundrum.png\" alt=\"Blog thumbnail of a skull in-front of a man\" width=\"1500\" height=\"1500\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">March 17, 2022<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/cracking-the-ransomware-conundrum\/\">Cracking the Ransomware Conundrum<\/a><\/h6>\n<p>November 30, 2021<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/11\/festive-shopping.jpg\" alt=\"Blog thumbnail of a keyboard\" width=\"1000\" height=\"1000\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">November 30, 2021<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/festive-shopping-exposed\/\">Festive Shopping Exposed<\/a><\/h6>\n<p>October 27, 2021<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/10\/Ransomware-\u2013-The-Kick-Off.png\" alt=\"Blog thumbnail of a football centre spot\" width=\"1500\" height=\"1500\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">October 27, 2021<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blog-archive\/\" rel=\"category tag\">Blog archive<\/a><\/li>\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/ransomware-the-kick-off\/\">Ransomware \u2013 The Kick-Off<\/a><\/h6>\n<p>October 1, 2021<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/10\/ignition-technology-takes-a-look-at-ransomware-attack-on-technology-giant-olympus.png\" alt=\"Blog thumbnail of a skull created in code\" width=\"1500\" height=\"1500\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">October 1, 2021<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blog-archive\/\" rel=\"category tag\">Blog archive<\/a><\/li>\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/blackmatter-ransomware\/\">Ignition Technology Takes A Look At Ransomware Attack on Technology Giant, Olympus<\/a><\/h6>\n<p>September 17, 2021<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/09\/ransomeware.jpg\" alt=\"Blog thumbnail of a skull in-front of a man\" width=\"1000\" height=\"1000\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">September 17, 2021<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blog-archive\/\" rel=\"category tag\">Blog archive<\/a><\/li>\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/ransomware-campaign\/\">Ransomware \u2013 Our new campaign<\/a><\/h6>\n<p>September 2, 2021<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/09\/ask-ignition.jpg\" alt=\"Blog thumbnail of a lightbulb\" width=\"1000\" height=\"1000\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">September 2, 2021<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/axonious-blogs\/\" rel=\"category tag\">Axonious Blogs<\/a><\/li>\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/what-why-how-asset-mangement\/\">The what, why &amp; how of Asset Management<\/a><\/h6>\n<p>August 17, 2021<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/08\/xdr-ultimate-tla.jpg\" alt=\"Blog thumbnail of a padlock\" width=\"1000\" height=\"1000\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">August 17, 2021<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/xdr-the-ultimate-tla\/\">XDR: The Ultimate TLA<\/a><\/h6>\n<p>August 3, 2021<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/08\/ransomware-and-how-it-affects-me.png\" alt=\"Blog thumbnail of an open padlock\" width=\"1500\" height=\"1500\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">August 3, 2021<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/ransomware-how-it-affects-me\/\">Ransomware &amp; How It Affects Me<\/a><\/h6>\n<p>July 22, 2021<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/07\/the-demise-of-the-corporate-lan.png\" alt=\"Blog thumbnail of large buildings\" width=\"1500\" height=\"1500\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">July 22, 2021<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/the-demise-of-the-corporate-lan\/\">The Demise Of The Corporate Lan<\/a><\/h6>\n<p>July 8, 2021<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/07\/ransomeware-2021.jpg\" alt=\"Blog thumbnail of warning sign\" width=\"1000\" height=\"1000\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">July 8, 2021<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/part-one-ransomware-better-faster-stronger\/\">Part One: Ransomware. Better, Faster &amp; Stronger<\/a><\/h6>\n<p>June 21, 2021<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/06\/identity-new-perimeter.jpg\" alt=\"Blog thumbnail of an eye created by code\" width=\"1000\" height=\"1000\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">June 21, 2021<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/identity-is-the-new-perimeter\/\">Identity is the New Perimeter.<\/a><\/h6>\n<p>June 21, 2021<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/06\/Blogs-Thumbnails.png\" alt=\"Blog thumbnail of the Ignition and Okta logos\" width=\"1500\" height=\"1500\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">June 21, 2021<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/5-reasons-you-want-an-out-of-the-box-identity-service-2\/\">5 Reasons You Want an Out-of-the-Box Identity Service<\/a><\/h6>\n<p>March 11, 2021<img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/06\/Blogs-Thumbnails.png\" alt=\"Blog thumbnail of the Ignition and Okta logos\" width=\"1500\" height=\"1500\" \/><span class=\"vcard author post-author\"><span class=\"label\">Published by <\/span> <span class=\"fn\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/author\/shereengriebenow\/\">Ignition Technology<\/a><\/span><\/span> <span class=\"date\"><span class=\"label\">on <\/span> <span class=\"post-date updated\">March 11, 2021<\/span><\/span><span class=\"cat-btn\">Categories <\/span><\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a><\/li>\n<li><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/category\/blogs\/okta-blogs\/\" rel=\"category tag\">Okta Blogs<\/a><\/li>\n<\/ul>\n<h6 class=\"entry-title\"><a href=\"https:\/\/www.ignition-technology.com\/fr\/blog\/were-living-through-a-digital-transformation-has-your-security-kept-up\/\">We\u2019re Living Through a Digital Transformation. Has Your Security Kept Up?<\/a><\/h6>\n<h2>Cybersecurity Blog<\/h2>\n<h2>How Do We Partner With Ignition?<\/h2>\n<p>We are keen to work with like-minded partners that are looking to drive business and successful outcomes for their customers. If you are a VAR interested in any of the technologies across our portfolio, get in touch with our team today.<\/p>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" href=\"\/become-a-partner\/\"><span class=\"button_label\">Become a Partner<\/span><\/a><\/p>\n<p><span class=\"num\">1<\/span>How do I become an Ignition Technology Partner or VAR?You can get in touch with us by clicking on the Become a Partner button or via the information on our Contact Us page. Once we receive your request, we\u2019ll get one of Channel specialists to contact you and take you through our onboarding process.<br \/>\n<span class=\"num\">2<\/span>What support does Ignition Technology offer Partners or VARs?At Ignition Technology, we work as an extension of your team. Whether you need support with sales &amp; product training, pre-sales services, go-to-marketing &amp; lead-gen campaigns, or implementation, our team is ready to help you identify &amp; convert opportunities across our portfolio.<br \/>\n<span class=\"num\">3<\/span>Why partner with Ignition Technology?Nobody knows cloud &amp; Saas cybersecurity solutions like we do. Our team understands the intricacies of the industry, the complexities of the technologies in the market, and are committed to developing and supporting the channel.<br \/>\n<span class=\"num\">4<\/span>How long does it take to become a Partner?No two VARs are the same. Once our team has made contact with you and understood your requirements, we\u2019ll build out an onboarding programme that is unique to you and the vendors that you would like to sell. The programme will include a short qualification process and if successful will be followed by dedicated enablement sessions. You could be transacting in a matter of weeks.<br \/>\n<span class=\"num\">5<\/span>How do I transact through Ignition Technology?We work closely with our Vendors and will support you in protecting your opportunities by registering your deals. We will follow up, keeping you informed every step of the way.<\/p>\n<h2><span style=\"color: #ffffff\">Follow us on<\/span> <span style=\"color: #41bfea;letter-spacing: 0px\">LinkedIn<\/span> <span style=\"color: #ffffff;letter-spacing: 0px\">for the latest industry news and events!<\/span><\/h2>\n<p><a class=\"button button_size_2\" title=\"\" href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwids6yAo4KEAxUPUkEAHSDLDxcQFnoECBEQAQ&amp;url=https%3A%2F%2Fuk.linkedin.com%2Fcompany%2Fignition-technology&amp;usg=AOvVaw26OjtsUw0Rb2qaWdv6TRzX&amp;opi=89978449\"><span class=\"button_label\">Follow Now<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Ignition Blog All the Latest Cybersecurity Blogs from Ignition Cybersecurity Blog May 2, 2023Published by Ignition Technology on May<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-352","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ignition FR Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"All the Latest Cybersecurity Blogs from Ignition Technology\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blogs\" \/>\n<meta property=\"og:description\" content=\"All the Latest Cybersecurity Blogs from Ignition Technology\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ignition-technology.com\/fr\/blogs\/\" \/>\n<meta property=\"og:site_name\" content=\"Ignition Technology FR\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-09T15:23:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/05\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ignition_tech\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blogs\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blogs\\\/\",\"name\":\"Ignition FR Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blogs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blogs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/14\\\/2023\\\/05\\\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png\",\"datePublished\":\"2023-09-27T15:32:43+00:00\",\"dateModified\":\"2024-09-09T15:23:47+00:00\",\"description\":\"All the Latest Cybersecurity Blogs from Ignition Technology\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blogs\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blogs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blogs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/14\\\/2023\\\/05\\\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/14\\\/2023\\\/05\\\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png\",\"width\":1500,\"height\":1500,\"caption\":\"Blog thumbnail of a man pointing to whiteboard with sticky notes\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/blogs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/\",\"name\":\"Iginition Technology\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#organization\",\"name\":\"Iginition Technology\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/14\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/14\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"caption\":\"Iginition Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/ignition_tech\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UChpbrHykg8qwmT4hQSHwqXQ\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ignition-technology\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ignition FR Cybersecurity Blog","description":"All the Latest Cybersecurity Blogs from Ignition Technology","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_GB","og_type":"article","og_title":"Blogs","og_description":"All the Latest Cybersecurity Blogs from Ignition Technology","og_url":"https:\/\/www.ignition-technology.com\/fr\/blogs\/","og_site_name":"Ignition Technology FR","article_modified_time":"2024-09-09T15:23:47+00:00","og_image":[{"url":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/05\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@ignition_tech","twitter_misc":{"Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ignition-technology.com\/fr\/blogs\/","url":"https:\/\/www.ignition-technology.com\/fr\/blogs\/","name":"Ignition FR Cybersecurity Blog","isPartOf":{"@id":"https:\/\/www.ignition-technology.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ignition-technology.com\/fr\/blogs\/#primaryimage"},"image":{"@id":"https:\/\/www.ignition-technology.com\/fr\/blogs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/05\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png","datePublished":"2023-09-27T15:32:43+00:00","dateModified":"2024-09-09T15:23:47+00:00","description":"All the Latest Cybersecurity Blogs from Ignition Technology","breadcrumb":{"@id":"https:\/\/www.ignition-technology.com\/fr\/blogs\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ignition-technology.com\/fr\/blogs\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/fr\/blogs\/#primaryimage","url":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/05\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png","contentUrl":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/05\/How-to-Build-a-Comprehensive-Identity-Security-Strategy-01.png","width":1500,"height":1500,"caption":"Blog thumbnail of a man pointing to whiteboard with sticky notes"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ignition-technology.com\/fr\/blogs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ignition-technology.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Blogs"}]},{"@type":"WebSite","@id":"https:\/\/www.ignition-technology.com\/fr\/#website","url":"https:\/\/www.ignition-technology.com\/fr\/","name":"Iginition Technology","description":"","publisher":{"@id":"https:\/\/www.ignition-technology.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ignition-technology.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.ignition-technology.com\/fr\/#organization","name":"Iginition Technology","url":"https:\/\/www.ignition-technology.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/09\/Ignition-logo-black.svg","contentUrl":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/09\/Ignition-logo-black.svg","caption":"Iginition Technology"},"image":{"@id":"https:\/\/www.ignition-technology.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ignition_tech","https:\/\/www.youtube.com\/channel\/UChpbrHykg8qwmT4hQSHwqXQ","https:\/\/www.linkedin.com\/company\/ignition-technology\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/pages\/352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/comments?post=352"}],"version-history":[{"count":7,"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/pages\/352\/revisions"}],"predecessor-version":[{"id":19128,"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/pages\/352\/revisions\/19128"}],"wp:attachment":[{"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/media?parent=352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}