{"id":389,"date":"2023-10-11T11:59:50","date_gmt":"2023-10-11T11:59:50","guid":{"rendered":"https:\/\/www.ignition-technology.com\/fr\/?page_id=389"},"modified":"2024-09-10T13:52:18","modified_gmt":"2024-09-10T13:52:18","slug":"solutions","status":"publish","type":"page","link":"https:\/\/www.ignition-technology.com\/fr\/solutions\/","title":{"rendered":"Solutions"},"content":{"rendered":"<h1 style=\"text-align: center;\">Cybersecurity Solutions<\/h1>\n<h5 style=\"text-align: center;\"><span style=\"color: #fff;\">Ignition Technology has developed several solution-based propositions to address the complexity of cybersecurity for you and your customers.<\/span><\/h5>\n<h2>Our Cybersecurity Solutions<\/h2>\n<p style=\"color: #828896;\"><span style=\"letter-spacing: 0px;\">Navigating today&#8217;s interconnected digital landscape needs a solution-based approach. At Ignition Technology, we focus on key areas to provide holistic and comprehensive Cybersecurity Solutions that address the complexity of cloud and Saas cybersecurity.<\/span><\/p>\n<ul class=\"offer_thumb_ul\">\n<li class=\"offer_thumb_li id_1\">\n<h6><\/h6>\n<h6>OUR SOLUTIONS<\/h6>\n<h2>Identity<\/h2>\n<p>Introducing Catalyst Services from Ignition Technology; professional services &amp; consulting, solution implementation, health checks, support, managed services and education, all created to help you successfully deliver client projects with exceptional quality and minimal overhead.<\/p>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" target=\"_blank\" rel=\"noopener\"><span class=\"button_label\">Read more<\/span><\/a><\/p>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/12\/Ignition_education_icon-1.svg\" alt=\"thumbnail\" \/><\/li>\n<li class=\"offer_thumb_li id_2\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2024\/01\/Solution-Icons.svg\" alt=\"Blue Gradient Icon for Identity Security\" \/><br \/>\n<h6><\/h6>\n<h6>OUR SOLUTIONS<\/h6>\n<h2>Cybersecurity Solutions &#8211; Identity Security<\/h2>\n<p>In today\u2019s rapidly evolving digital landscape, where digital transformation means increased connectivity and collaboration, the need to safeguard online identities is paramount. Identity lies at the heart of any cybersecurity strategy, serving as the gateway to sensitive information and critical systems.<\/p>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" href=\"https:\/\/www.ignition-technology.com\/fr\/solutions\/identity-security\/\" target=\"_blank\" rel=\"noopener\"><span class=\"button_label\">Read More<\/span><\/a><\/p>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/12\/Solution-Buttons_Identity-2.svg#18248\" alt=\"thumbnail\" \/><\/li>\n<li class=\"offer_thumb_li id_3\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2024\/01\/Solution-Icons_Cyber-Insurance.svg\" alt=\"Blue Gradient Icon for Cyber Insurance\" \/><br \/>\n<h6><\/h6>\n<h6>OUR SOLUTIONS<\/h6>\n<h2>Cybersecurity Solutions &#8211; Cyber Insurance<\/h2>\n<p>Cyber insurance is a type of insurance coverage designed to protect businesses and individuals from financial losses resulting from cyberattacks and data breaches. It typically covers expenses related to the investigation, notification, and recovery processes following a cyber incident.<\/p>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" href=\"https:\/\/www.ignition-technology.com\/fr\/solutions\/cyber-insurance\/\" target=\"_blank\" rel=\"noopener\"><span class=\"button_label\">Read More<\/span><\/a><\/p>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/12\/Solution-Buttons_Cyber-Insurance.svg#18053\" alt=\"thumbnail\" \/><\/li>\n<li class=\"offer_thumb_li id_4\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2024\/01\/Solution-Icons_Compliance.svg\" alt=\"Blue Gradient Icon for Compliance\" \/><br \/>\n<h6><\/h6>\n<h6>OUR SOLUTIONS<\/h6>\n<h2>Cybersecurity Solutions &#8211; Compliance<\/h2>\n<p>The increased reliance on technology for businesses to run optimally means more opportunities for cyber criminals to take advantage of. To mitigate this risk and help companies to better protect themselves and their data, Government organisations have built a number of cybersecurity compliance frameworks that regulate online practices, policies, and controls.<\/p>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" href=\"https:\/\/www.ignition-technology.com\/fr\/solutions\/compliance\/\" target=\"_blank\" rel=\"noopener\"><span class=\"button_label\">Read More<\/span><\/a><\/p>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/12\/Solution-Buttons_Compliance.svg#18054\" alt=\"thumbnail\" \/><\/li>\n<li class=\"offer_thumb_li id_5\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2024\/01\/Solution-Icons_Zero-Trust.svg\" alt=\"Blue Gradient Icon for Zero Trust\" \/><br \/>\n<h6><\/h6>\n<h6>OUR SOlUTIONS<\/h6>\n<h2>Cybersecurity Solutions &#8211; Zero Trust<\/h2>\n<p>Zero Trust is a cybersecurity model that assumes no implicit trust, even within an organisation\u2019s network, and requires verification from anyone trying to access resources and assets. It originated from the realisation that traditional security models, which relied heavily on perimeter defenses, were not enough when addressing the evolving threat landscape of advanced cyberattacks and insider threats.<\/p>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" href=\"https:\/\/www.ignition-technology.com\/fr\/solutions\/zero-trust\/\"><span class=\"button_label\">Read More<\/span><\/a><\/p>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/09\/Solution-Buttons_Zero-Trust.svg#18055\" alt=\"thumbnail\" \/><\/li>\n<li class=\"offer_thumb_li id_6\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2024\/01\/Solution-Icons_Microsoft-Attach.svg\" alt=\"Blue Gradient Icon for Securing Microsoft\" \/><br \/>\n<h6><\/h6>\n<h6>OUR SOLUTIONS<\/h6>\n<h2>Cybersecurity Solutions &#8211; Securing Microsoft<\/h2>\n<p>Although products within the Microsoft suite are widely adopted and highly reputable, this does not make them immune. Microsoft\u2019s built in security is not comprehensive or robust enough to cover the sophistication of attacks we see these days.<\/p>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" href=\"https:\/\/www.ignition-technology.com\/fr\/solutions\/securing-microsoft\/\"><span class=\"button_label\">Read More<\/span><\/a><\/p>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/09\/Solution-Buttons_Microsoft-Attach-3.svg#18247\" alt=\"thumbnail\" \/><\/li>\n<li class=\"offer_thumb_li id_7\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2024\/01\/Solution-Icons_Ransomware.svg\" alt=\"Blue Gradient Icon for Ransomware\" \/><br \/>\n<h6><\/h6>\n<h6>OUR SOLUTIONS<\/h6>\n<h2>Ransomware<\/h2>\n<p>Ransomware is a type of malicious software that encrypts a victim\u2019s files, rendering them inaccessible until a ransom is paid. Ransomware attacks significantly impact businesses by disrupting operations, causing financial losses, and leading to reputational damage. Protecting against ransomware requires a multi-layered approach that combines technological solutions, best practices, and user awareness.<\/p>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" href=\"https:\/\/www.ignition-technology.com\/fr\/solutions\/ransomware\/\"><span class=\"button_label\">Read More<\/span><\/a><\/p>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2024\/01\/Solution-Buttons_Ransomware.svg#18057\" alt=\"thumbnail\" \/><\/li>\n<li class=\"offer_thumb_li id_8\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2024\/01\/Solution-Icons_OT-IoT.svg\" alt=\"Blue Gradient Icon for OT &amp; IoT\" \/><br \/>\n<h6><\/h6>\n<h6>OUR SOLUTIONS<\/h6>\n<h2>OT &amp; IoT<\/h2>\n<p>Operational Technology (OT) refers to the hardware and software used to monitor and control physical processes in complex industries such as manufacturing, energy, and transportation. The Internet of Things (IoT), on the otherhand, is a broader concept where everyday objects are connected to the internet, enabling them to collect and exchange data.<\/p>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" href=\"https:\/\/www.ignition-technology.com\/fr\/solutions\/ot-iot\/\"><span class=\"button_label\">Read More<\/span><\/a><\/p>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2024\/01\/Solution-Buttons_OT-IoT.svg#18058\" alt=\"thumbnail\" \/><\/li>\n<li class=\"offer_thumb_li id_9\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2024\/01\/Solution-Icons_Cyber-Resiliance.svg\" alt=\"Blue Gradient Icon for Cyber Resilience\" \/><br \/>\n<h6><\/h6>\n<h6>OUR SOLUTIONS<\/h6>\n<h2>Cyber Resilience<\/h2>\n<p>Cyber resilience refers to an organisation ability to prepare for, respond to, and recover from cyber threats. It requires a comprehensive approach to cybersecurity that goes beyond just preventing attacks and focuses on ensuring the continuity of operations and the ability to bounce back from a cyber incident.<\/p>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" href=\"https:\/\/www.ignition-technology.com\/fr\/solutions\/cyber-resilience\/\"><span class=\"button_label\">Read More<\/span><\/a><\/p>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2024\/01\/Solution-Buttons_Cyber-Resiliance.svg#18059\" alt=\"thumbnail\" \/><\/li>\n<li class=\"offer_thumb_li id_10\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2024\/01\/Solution-Icons_Cloud-Security.svg\" alt=\"Blue Gradient Icon for Cloud Security\" \/><br \/>\n<h6><\/h6>\n<h6>OUR SOLUTIONS<\/h6>\n<h2>Cybersecurity Solutions &#8211; Cloud Security<\/h2>\n<p>In today\u2019s increasingly interconnected and digital business landscape, managing cloud security is critical. Not only to protect against evolving cyber threats, but also to ensure compliance with regulations, safeguarding sensitive data, and ensuring the secure and resilient operation of business-critical processes.<\/p>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" href=\"https:\/\/www.ignition-technology.com\/fr\/solutions\/cloud-security\/\"><span class=\"button_label\">Read More<\/span><\/a><\/p>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2024\/01\/Solution-Buttons_Cloud-Security.svg#18060\" alt=\"thumbnail\" \/><\/li>\n<li class=\"offer_thumb_li id_11\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2024\/01\/Solution-Icons_Generative-AI.svg\" alt=\"Blue Gradient Icon for Generative AI\" \/><br \/>\n<h6><\/h6>\n<h6>OUR SOLUTIONS<\/h6>\n<h2>Generative AI<\/h2>\n<p>What sets our Cyber Risk Assessment apart, is that it\u2019s powered by technology. Our tools provide a view and analysis of your environment without needing to deploy any agents. The findings are based on the risks and data the technologies find in your live environment.<\/p>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" href=\"https:\/\/www.ignition-technology.com\/fr\/service-solutions-template\/\"><span class=\"button_label\">Read More<\/span><\/a><\/p>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2024\/01\/Solution-Buttons_Generative-AI.svg#18061\" alt=\"thumbnail\" \/><\/li>\n<\/ul>\n<h2>How Do We Partner With Ignition?<\/h2>\n<p>We are keen to work with like-minded partners that are looking to drive business and successful outcomes for their customers. If you are a VAR interested in any of the technologies across our portfolio, get in touch with our team today.<\/p>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" href=\"\/become-a-partner\/\"><span class=\"button_label\">Become a Partner<\/span><\/a><\/p>\n<p><span class=\"num\">1<\/span>How do I become an Ignition Technology Partner or VAR?You can get in touch with us by clicking on the Become a Partner button or via the information on our Contact Us page. Once we receive your request, we\u2019ll get one of Channel specialists to contact you and take you through our onboarding process.<br \/>\n<span class=\"num\">2<\/span>What support does Ignition Technology offer Partners or VARs?At Ignition Technology, we work as an extension of your team. Whether you need support with sales &amp; product training, pre-sales services, go-to-marketing &amp; lead-gen campaigns, or implementation, our team is ready to help you identify &amp; convert opportunities across our portfolio.<br \/>\n<span class=\"num\">3<\/span>Why partner with Ignition Technology?Nobody knows cloud &amp; Saas cybersecurity solutions like we do. Our team understands the intricacies of the industry, the complexities of the technologies in the market, and are committed to developing and supporting the channel.<br \/>\n<span class=\"num\">4<\/span>How long does it take to become a Partner?No two VARs are the same. Once our team has made contact with you and understood your requirements, we\u2019ll build out an onboarding programme that is unique to you and the vendors that you would like to sell. The programme will include a short qualification process and if successful will be followed by dedicated enablement sessions. You could be transacting in a matter of weeks.<br \/>\n<span class=\"num\">5<\/span>How do I transact through Ignition Technology?We work closely with our Vendors and will support you in protecting your opportunities by registering your deals. We will follow up, keeping you informed every step of the way.<\/p>\n<h2><span style=\"color: #ffffff;\">Follow us on<\/span> <span style=\"color: #41bfea; letter-spacing: 0px;\">LinkedIn<\/span> <span style=\"color: #ffffff; letter-spacing: 0px;\">for the latest industry news and events!<\/span><\/h2>\n<p><a class=\"button button_size_2\" title=\"\" href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwids6yAo4KEAxUPUkEAHSDLDxcQFnoECBEQAQ&amp;url=https%3A%2F%2Fuk.linkedin.com%2Fcompany%2Fignition-technology&amp;usg=AOvVaw26OjtsUw0Rb2qaWdv6TRzX&amp;opi=89978449\"><span class=\"button_label\">Follow Now<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Solutions Ignition Technology has developed several solution-based propositions to address the complexity of cybersecurity for you and your customers.<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-389","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Solutions Approach<\/title>\n<meta name=\"description\" content=\"Ignition offers a solution-based approach by focusing on the key areas to tackle the complexity of cloud and Saas cybersecurity.\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Solutions\" \/>\n<meta property=\"og:description\" content=\"Ignition offers a solution-based approach by focusing on the key areas to tackle the complexity of cloud and Saas cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ignition-technology.com\/fr\/solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"Ignition Technology FR\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-10T13:52:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/12\/Ignition_education_icon-1.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ignition_tech\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/solutions\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/solutions\\\/\",\"name\":\"Cybersecurity Solutions Approach\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/solutions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/14\\\/2021\\\/12\\\/Ignition_education_icon-1.svg\",\"datePublished\":\"2023-10-11T11:59:50+00:00\",\"dateModified\":\"2024-09-10T13:52:18+00:00\",\"description\":\"Ignition offers a solution-based approach by focusing on the key areas to tackle the complexity of cloud and Saas cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/solutions\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/solutions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/solutions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/14\\\/2021\\\/12\\\/Ignition_education_icon-1.svg\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/14\\\/2021\\\/12\\\/Ignition_education_icon-1.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/solutions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/\",\"name\":\"Iginition Technology\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#organization\",\"name\":\"Iginition Technology\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/14\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/14\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"caption\":\"Iginition Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/ignition_tech\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UChpbrHykg8qwmT4hQSHwqXQ\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ignition-technology\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Solutions Approach","description":"Ignition offers a solution-based approach by focusing on the key areas to tackle the complexity of cloud and Saas cybersecurity.","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_GB","og_type":"article","og_title":"Solutions","og_description":"Ignition offers a solution-based approach by focusing on the key areas to tackle the complexity of cloud and Saas cybersecurity.","og_url":"https:\/\/www.ignition-technology.com\/fr\/solutions\/","og_site_name":"Ignition Technology FR","article_modified_time":"2024-09-10T13:52:18+00:00","og_image":[{"url":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/12\/Ignition_education_icon-1.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@ignition_tech","twitter_misc":{"Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ignition-technology.com\/fr\/solutions\/","url":"https:\/\/www.ignition-technology.com\/fr\/solutions\/","name":"Cybersecurity Solutions Approach","isPartOf":{"@id":"https:\/\/www.ignition-technology.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ignition-technology.com\/fr\/solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.ignition-technology.com\/fr\/solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/12\/Ignition_education_icon-1.svg","datePublished":"2023-10-11T11:59:50+00:00","dateModified":"2024-09-10T13:52:18+00:00","description":"Ignition offers a solution-based approach by focusing on the key areas to tackle the complexity of cloud and Saas cybersecurity.","breadcrumb":{"@id":"https:\/\/www.ignition-technology.com\/fr\/solutions\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ignition-technology.com\/fr\/solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/fr\/solutions\/#primaryimage","url":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/12\/Ignition_education_icon-1.svg","contentUrl":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2021\/12\/Ignition_education_icon-1.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ignition-technology.com\/fr\/solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ignition-technology.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.ignition-technology.com\/fr\/#website","url":"https:\/\/www.ignition-technology.com\/fr\/","name":"Iginition Technology","description":"","publisher":{"@id":"https:\/\/www.ignition-technology.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ignition-technology.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.ignition-technology.com\/fr\/#organization","name":"Iginition Technology","url":"https:\/\/www.ignition-technology.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/09\/Ignition-logo-black.svg","contentUrl":"https:\/\/www.ignition-technology.com\/fr\/wp-content\/uploads\/sites\/14\/2023\/09\/Ignition-logo-black.svg","caption":"Iginition Technology"},"image":{"@id":"https:\/\/www.ignition-technology.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ignition_tech","https:\/\/www.youtube.com\/channel\/UChpbrHykg8qwmT4hQSHwqXQ","https:\/\/www.linkedin.com\/company\/ignition-technology\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/pages\/389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/comments?post=389"}],"version-history":[{"count":4,"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/pages\/389\/revisions"}],"predecessor-version":[{"id":18822,"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/pages\/389\/revisions\/18822"}],"wp:attachment":[{"href":"https:\/\/www.ignition-technology.com\/fr\/wp-json\/wp\/v2\/media?parent=389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}