{"id":401436,"date":"2022-10-27T08:00:20","date_gmt":"2022-10-27T15:00:20","guid":{"rendered":"https:\/\/blog.webex.com\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/"},"modified":"2024-09-17T23:36:11","modified_gmt":"2024-09-18T06:36:11","slug":"les-nouveautes-webex-security-octobre-2022","status":"publish","type":"post","link":"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/","title":{"rendered":"Les nouveaut\u00e9s Webex\u00a0Security\u00a0: octobre\u00a02022"},"content":{"rendered":"<p>Avec l&rsquo;essor du travail hybride dans le monde entier, la s\u00e9curit\u00e9 est devenue un sujet majeur pour les entreprises et leur personnel. Les collaborateurs doivent pouvoir acc\u00e9der facilement aux donn\u00e9es et communiquer au-del\u00e0 de du r\u00e9seau de l&rsquo;entreprise. Mais lorsque les employ\u00e9s travaillent en dehors des limites de l&rsquo;entreprise depuis leurs appareils personnels, il devient bien plus difficile de garantir la s\u00e9curit\u00e9, la confidentialit\u00e9 et la conformit\u00e9 des \u00e9changes. Webex\u00a0Security s&rsquo;adapte pour vous aider \u00e0 relever ces d\u00e9fis.<\/p>\n<p>Webex by Cisco a toujours \u00e9t\u00e9 guid\u00e9 par un principe fondateur\u00a0: \u00ab\u00a0la collaboration sans compromis\u00a0\u00bb. Nous favorisons une approche holistique et sans angle mort de la s\u00e9curit\u00e9 des utilisateurs, des contenus, des applications et des \u00e9quipements. Cela inclut l&rsquo;analyse des surfaces d&rsquo;exposition aux attaques et des vecteurs de menace, et l&rsquo;\u00e9laboration de commandes pour assurer la s\u00e9curit\u00e9 de vos donn\u00e9es, peu importe o\u00f9 vos employ\u00e9s travaillent et avec qui.<\/p>\n<p>Voici quelques unes des nouvelles fonctionnalit\u00e9s que nous avons annonc\u00e9es lors de WebexOne\u00a02022.<\/p>\n<h2>Identit\u00e9 et acc\u00e8s<\/h2>\n<h4><span>Authentification multifacteur (MFA) Duo ajout\u00e9e \u00e0 l&rsquo;Extended\u00a0Security\u00a0Pack (ESP)<\/span><\/h4>\n<p>L&rsquo;Extended Security Pack (ESP) inclut \u00e0 pr\u00e9sent l&rsquo;authentification Duo\u00a0MFA. Gr\u00e2ce \u00e0 cela, les clients peuvent utiliser l&rsquo;authentification single sign-on (SSO), l&rsquo;authentification multifacteur (MFA) et l&rsquo;authentification sans mot de passe. Cela permet \u00e0 Webex de v\u00e9rifier le niveau de confiance \u00e0 accorder \u00e0 l&rsquo;utilisateur, rapidement et de mani\u00e8re s\u00e9curis\u00e9e, pour chaque tentative d&rsquo;acc\u00e8s, afin de garantir la s\u00e9curit\u00e9 des donn\u00e9es. Duo offre le plus large \u00e9ventail d&rsquo;options MFA\u00a0: Duo\u00a0Push, des cl\u00e9s de s\u00e9curit\u00e9, le second facteur universel (U2F), le mot de passe \u00e0 usage unique (OTP), le rappel sur mobile, les SMS et jetons d&rsquo;authentification. Avec Duo, l&rsquo;authentification MFA est flexible et facile d&rsquo;utilisation. Les options de configuration permettent de couvrir l&rsquo;ensemble de l&rsquo;entreprise ou un groupe sp\u00e9cifique d&rsquo;utilisateurs Webex.<\/p>\n<p><a href=\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/webex-security-extended-pack.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-399123 size-full\" src=\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/webex-security-extended-pack.jpg\" alt=\"Webex\u00a0Security\u00a0Extended\u00a0Pack avec Cloudlock, Talos, Ethical\u00a0Wall et Duo\u00a0MFA\" width=\"980\" height=\"362\" srcset=\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/webex-security-extended-pack.jpg 980w, https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/webex-security-extended-pack-300x111.jpg 300w, https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/webex-security-extended-pack-768x284.jpg 768w\" sizes=\"auto, (max-width: 980px) 100vw, 980px\" \/><\/a><\/p>\n<p>Cette nouveaut\u00e9 am\u00e9liore la productivit\u00e9 et l&rsquo;exp\u00e9rience des utilisateurs finaux. Elle renforce \u00e9galement la s\u00e9curit\u00e9 de l&rsquo;entreprise et r\u00e9duit son exposition aux menaces, tout en respectant les exigences de conformit\u00e9 r\u00e9glementaires.<\/p>\n<p>Si Webex fournit un bundle haut de gamme de produits de s\u00e9curit\u00e9 Cisco pr\u00e9int\u00e9gr\u00e9s dans le pack ESP, il entretient \u00e9galement un \u00e9cosyst\u00e8me ouvert \u00e0 travers sa plateforme de d\u00e9veloppement. Cela permet aux partenaires d&rsquo;int\u00e9grer et de proposer des solutions de s\u00e9curit\u00e9, de conformit\u00e9 et de pr\u00e9vention des pertes de donn\u00e9es (DLP) \u00e0 leurs clients. Webex dispose \u00e9galement de l&rsquo;un des plus grands \u00e9cosyst\u00e8mes de partenaires de s\u00e9curit\u00e9 et de conformit\u00e9, allant de start-ups \u00e0 des acteurs majeurs du secteur.<\/p>\n<h2>Confidentialit\u00e9<\/h2>\n<h4><span>Bring\u00a0Your\u00a0Own\u00a0Key (BYOK)<\/span><\/h4>\n<p>Depuis\u00a02015, nous avons autoris\u00e9 les clients \u00e0 g\u00e9rer les cl\u00e9s de chiffrage sur site dans leur data center afin de prot\u00e9ger leurs donn\u00e9es Webex dans le cloud. Nous impl\u00e9mentons maintenant les m\u00eames capacit\u00e9s dans le cloud avec la fonctionnalit\u00e9 BYOK.<\/p>\n<p>Avec BYOK, les clients peuvent importer leur cl\u00e9 dans CloudHSM en utilisant <a href=\"https:\/\/www.webex.com\/control-hub.html\" target=\"_blank\" rel=\"noopener\">Control\u00a0Hub<\/a>, puis l&rsquo;utiliser pour prot\u00e9ger tout le contenu g\u00e9n\u00e9r\u00e9 par les utilisateurs, comme les enregistrements de r\u00e9union, les transcriptions, les messages \u00e9crits, les fichiers et les messages vocaux. La fonctionnalit\u00e9 permet \u00e9galement aux administrateurs de la s\u00e9curit\u00e9 de g\u00e9rer le cycle de vie de leur cl\u00e9, notamment l&rsquo;activation, la rotation, la r\u00e9vocation et la r\u00e9cup\u00e9ration.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/webex-security-master-key.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-399093\" src=\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/webex-security-master-key.jpg\" alt=\"\" width=\"980\" height=\"613\" \/><\/a><\/p>\n<h2>Pr\u00e9vention des pertes de donn\u00e9es (DLP)<\/h2>\n<h4><span>Filigranes Audio<\/span><\/h4>\n<p>Gr\u00e2ce \u00e0 la technologie de filigranes audio, Webex peut int\u00e9grer un identifiant inaudible unique pour chaque participant d&rsquo;une r\u00e9union. Cet identifiant permet au responsable de la conformit\u00e9 d&rsquo;une entreprise d&rsquo;utiliser Control\u00a0Hub pour charger un enregistrement et facilement remonter \u00e0 la source originale. Par exemple, cette fonctionnalit\u00e9 peut aider \u00e0 enqu\u00eater sur l&rsquo;enregistrement d&rsquo;une r\u00e9union confidentielle sans autorisation, post\u00e9 sur les r\u00e9seaux sociaux par un participant utilisant un mobile. Les filigranes audio peuvent permettre d&rsquo;identifier l&rsquo;origine de l&rsquo;enregistrement de la r\u00e9union et d&rsquo;\u00e9viter de futurs incidents.<\/p>\n<p><a href=\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/security-management-organization-analysis-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-399376 size-full\" src=\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/security-management-organization-analysis-1.png\" alt=\"Fonctionnalit\u00e9 de Webex\u00a0Security, \u00e9cran Control Hub affichant l'option d'ajout de filigranes audio par glisser-d\u00e9placer.\" width=\"1518\" height=\"768\" srcset=\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/security-management-organization-analysis-1.png 980w, https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/security-management-organization-analysis-1-300x152.png 300w, https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/security-management-organization-analysis-1-1024x518.png 1024w, https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/security-management-organization-analysis-1-768x389.png 768w\" sizes=\"auto, (max-width: 1518px) 100vw, 1518px\" \/><\/a><\/p>\n<h4><span>Informations sur le statut de la s\u00e9curit\u00e9<\/span><\/h4>\n<p>Pour aider les administrateurs IT \u00e0 avoir une vision claire de la s\u00e9curit\u00e9 de leur entreprise, Control\u00a0Hub propose \u00e0 pr\u00e9sent des informations sur le statut de la s\u00e9curit\u00e9. Ce tableau de bord facile \u00e0 utiliser permet aux administrateurs de garder le contr\u00f4le de la s\u00e9curit\u00e9 de leur entreprise. Il analyse \u00e9galement les configurations de s\u00e9curit\u00e9 en les comparant aux r\u00e9f\u00e9rentiels recommand\u00e9s, fournit des informations sur les niveaux de s\u00e9curit\u00e9 et guide les administrateurs avec des t\u00e2ches recommand\u00e9es.<\/p>\n<p><a href=\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/webex-security-cc-overview.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-399113 size-full\" src=\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/webex-security-cc-overview.jpg\" alt=\"\u00c9cran de pr\u00e9sentation de Webex\u00a0Security sur Webex\u00a0Control\u00a0Hub \" width=\"980\" height=\"486\" srcset=\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/webex-security-cc-overview.jpg 980w, https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/webex-security-cc-overview-300x149.jpg 300w, https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/webex-security-cc-overview-768x381.jpg 768w\" sizes=\"auto, (max-width: 980px) 100vw, 980px\" \/><\/a><\/p>\n<h2>Commandes de s\u00e9curit\u00e9 pour les r\u00e9unions<\/h2>\n<p>Webex offre maintenant un \u00e9ventail de commandes de s\u00e9curit\u00e9 pour les salles d&rsquo;attente et la participation aux r\u00e9unions afin d&rsquo;\u00e9viter les utilisateurs ind\u00e9sirables, les acc\u00e8s non autoris\u00e9s et les deepfakes. Ces commandes pr\u00e9sentent une garantie suppl\u00e9mentaire d&rsquo;organiser des r\u00e9unions s\u00e9curis\u00e9es qui ne risquent pas d&rsquo;\u00eatre interrompues.<\/p>\n<p><strong>L&rsquo;admission automatique<\/strong> permet aux invit\u00e9s connect\u00e9s sur Webex de rejoindre une r\u00e9union programm\u00e9e directement sans devoir passer par la salle d&rsquo;attente par d\u00e9faut. Les invit\u00e9s qui ne sont pas connect\u00e9s depuis Webex, ou ceux qui n&rsquo;ont pas d&rsquo;invitation, peuvent patienter dans la salle d&rsquo;attente jusqu&rsquo;\u00e0 ce qu&rsquo;un organisateur ou coorganisateur les accepte.<\/p>\n<p><strong>Les domaines de confiance pour les r\u00e9unions dans les salles personnelles<\/strong> n&rsquo;autorisent l&rsquo;acc\u00e8s aux r\u00e9unions qu&rsquo;aux utilisateurs ext\u00e9rieurs valid\u00e9s figurant sur une liste de domaines email de confiance. Ce param\u00e8tre peut se configurer au niveau de l&rsquo;utilisateur, du groupe ou de l&rsquo;entreprise.<\/p>\n<p><strong>Les commandes de salle d&rsquo;attente s\u00e9par\u00e9es pour les r\u00e9unions dans les salles personnelles<\/strong> peuvent aider \u00e0 attribuer des autorisations pour les utilisateurs ext\u00e9rieurs valid\u00e9s ou non, afin de d\u00e9terminer s&rsquo;ils peuvent rejoindre la r\u00e9union, doivent patienter en salle d&rsquo;attente ou ne sont pas autoris\u00e9s \u00e0 rejoindre la r\u00e9union.<\/p>\n<h2>Ce que cela implique pour le travail hybride<\/h2>\n<p>Nous pr\u00eatons une attention particuli\u00e8re aux inqui\u00e9tudes de nos clients concernant le travail hybride, qu&rsquo;elles soient li\u00e9es \u00e0 l&rsquo;acc\u00e8s aux donn\u00e9es, \u00e0 la confidentialit\u00e9, aux potentielles fuites de propri\u00e9t\u00e9s sensibles ou intellectuelles, ou \u00e0 la conformit\u00e9 r\u00e9glementaire et au respect des lois en vigueur. Simultan\u00e9ment, nous surveillons en permanence les nouvelles menaces et travaillons d&rsquo;arrache-pied afin de fournir rapidement de nouvelles commandes de s\u00e9curit\u00e9 pour la s\u00e9r\u00e9nit\u00e9 de nos clients.<\/p>\n<blockquote><p>\u00ab\u00a0Webex s&rsquo;est r\u00e9v\u00e9l\u00e9 \u00eatre une solution \u00ab\u00a0gagnant-gagnant-gagnant\u00a0\u00bb. Il nous permet de rester en contact avec nos \u00e9quipes et les membres de notre banque coop\u00e9rative. La plateforme est fiable, s\u00fbre, toujours disponible et demande moins de maintenance op\u00e9rationnelle.\u00a0\u00bb<\/p><\/blockquote>\n<p>\u2014\u00a0Janaki Rao, Vice-pr\u00e9sident et DSI, Premier\u00a0America\u00a0Credit\u00a0Union. (<a href=\"https:\/\/www.webex.com\/content\/dam\/wbx\/us\/case-study\/premier-america-credit-union_cm-4064.pdf\" target=\"_blank\" rel=\"noopener\">\u00c9tude de cas<\/a>)<\/p>\n<blockquote><p>\u00ab\u00a0Webex propose le plus grand nombre de commandes pour la s\u00e9curit\u00e9 et la confidentialit\u00e9, et est le seul fournisseur majeur UC&#038;CaaS \u00e0 offrir des communications ultras\u00e9curis\u00e9es.\u00a0\u00bb<\/p><\/blockquote>\n<p>\u2014 Sorell Slaymaker, Principal analyste conseil, TechVision\u00a0Research (<a href=\"https:\/\/www.nojitter.com\/ucaas\/evaluating-cisco-microsoft-zoom-ucaas-security\">Research)<\/a><\/p>\n<p>Pour en savoir plus, contactez le service commercial Cisco\u00a0Webex | <a href=\"https:\/\/use.webex.com\/contact-sales?lang=en\" target=\"_blank\" rel=\"noopener\">Contacter le service commercial<\/a><\/p>\n<p><strong>En savoir plus<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.nojitter.com\/ucaas\/evaluating-cisco-microsoft-zoom-ucaas-security\" target=\"_blank\" rel=\"noopener\">\u00c9valuation de Cisco\u00a0Webex, Microsoft et Zoom sur UCaaS\u00a0Security<\/a>, par Sorell Slaymaker, principal analyste conseil chez TechVision\u00a0Research<\/li>\n<li><a href=\"https:\/\/www.webex.com\/security.html\" target=\"_blank\" rel=\"noopener\">La s\u00e9curit\u00e9, la confidentialit\u00e9 et la conformit\u00e9 avec Webex<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Avec l&rsquo;essor du travail hybride dans le monde entier, la s\u00e9curit\u00e9 est devenue un sujet majeur pour les entreprises et [&hellip;]<\/p>\n","protected":false},"author":5492,"featured_media":399971,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[5253,2770],"tags":[5606,3907,10304,2393,15593],"class_list":["post-401436","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-collaboration-fr","category-uncategorized-fr","tag-cisco-cloudlock-fr","tag-data-loss-prevention","tag-data-loss-prevention-fr","tag-travail-hybride","tag-webexone-2022-fr-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les nouveaut\u00e9s Webex\u00a0Security\u00a0: octobre\u00a02022 | Webex Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les nouveaut\u00e9s Webex\u00a0Security\u00a0: octobre\u00a02022 | Webex Blog\" \/>\n<meta property=\"og:description\" content=\"Avec l&rsquo;essor du travail hybride dans le monde entier, la s\u00e9curit\u00e9 est devenue un sujet majeur pour les entreprises et [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"Webex Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-27T15:00:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-18T06:36:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/security-update-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"980\" \/>\n\t<meta property=\"og:image:height\" content=\"520\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Raj Kumar\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Raj Kumar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/\"},\"author\":{\"name\":\"Raj Kumar\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/18c302625e0b77be3b663968df3e3da1\"},\"headline\":\"Les nouveaut\u00e9s Webex\u00a0Security\u00a0: octobre\u00a02022\",\"datePublished\":\"2022-10-27T15:00:20+00:00\",\"dateModified\":\"2024-09-18T06:36:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/\"},\"wordCount\":1226,\"image\":{\"@id\":\"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/security-update-feature.jpg\",\"keywords\":[\"Cisco Cloudlock\",\"Data Loss Prevention\",\"Data Loss Prevention\",\"travail hybride\",\"WebexOne 2022\"],\"articleSection\":[\"Collaboration\",\"Uncategorized @fr\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/\",\"url\":\"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/\",\"name\":\"Les nouveaut\u00e9s Webex\u00a0Security\u00a0: octobre\u00a02022 | Webex Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.webex.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/security-update-feature.jpg\",\"datePublished\":\"2022-10-27T15:00:20+00:00\",\"dateModified\":\"2024-09-18T06:36:11+00:00\",\"author\":{\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/18c302625e0b77be3b663968df3e3da1\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/#primaryimage\",\"url\":\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/security-update-feature.jpg\",\"contentUrl\":\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/security-update-feature.jpg\",\"width\":980,\"height\":520,\"caption\":\"#image_title\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.webex.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les nouveaut\u00e9s Webex\u00a0Security\u00a0: octobre\u00a02022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.webex.com\/es\/#website\",\"url\":\"https:\/\/blog.webex.com\/es\/\",\"name\":\"Webex Blog\",\"description\":\"Webex by Cisco powers collaboration through industry-leading video conferencing, cloud calling and contact center solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.webex.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/18c302625e0b77be3b663968df3e3da1\",\"name\":\"Raj Kumar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/67dde7c1ffcd3c70c105fe41db99b330af419dd5838083afcb7db05f17ae1fe2?s=96&d=wp_user_avatar&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/67dde7c1ffcd3c70c105fe41db99b330af419dd5838083afcb7db05f17ae1fe2?s=96&d=wp_user_avatar&r=g\",\"caption\":\"Raj Kumar\"},\"description\":\"Raj is Director of Product Management at Cisco Webex and responsible for the strategy, product management, and go to market for Webex Suite for US and Global Public Sector that includes Federal Civilian, State, Local and Education, and National Security and Defense. In addition, Raj also leads the strategy and product management of Webex commercial market expansion into new country\/region through data residency, sovereignty and sovereign clouds solutions, as well as encryption and key management technologies. Raj, previously, led the strategy and product management for the Identity platform, Security, Privacy &amp; Compliance, Partner ecosystem and established Webex as best-in-breed secure Collaboration platform. Raj has 15+ years of enterprise product management experience at leading technology companies, including Cisco, Microsoft, and Amazon. Raj holds a Master\u2019s degree in computer science from University of Florida and a Bachelor's degree in Electrical Engineering from Indian Institute of Technology (IIT).\",\"url\":\"https:\/\/blog.webex.com\/fr\/contributors\/rajkumar\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les nouveaut\u00e9s Webex\u00a0Security\u00a0: octobre\u00a02022 | Webex Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/","og_locale":"fr_FR","og_type":"article","og_title":"Les nouveaut\u00e9s Webex\u00a0Security\u00a0: octobre\u00a02022 | Webex Blog","og_description":"Avec l&rsquo;essor du travail hybride dans le monde entier, la s\u00e9curit\u00e9 est devenue un sujet majeur pour les entreprises et [&hellip;]","og_url":"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/","og_site_name":"Webex Blog","article_published_time":"2022-10-27T15:00:20+00:00","article_modified_time":"2024-09-18T06:36:11+00:00","og_image":[{"width":980,"height":520,"url":"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/security-update-feature.jpg","type":"image\/jpeg"}],"author":"Raj Kumar","twitter_misc":{"\u00c9crit par":"Raj Kumar","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/#article","isPartOf":{"@id":"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/"},"author":{"name":"Raj Kumar","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/18c302625e0b77be3b663968df3e3da1"},"headline":"Les nouveaut\u00e9s Webex\u00a0Security\u00a0: octobre\u00a02022","datePublished":"2022-10-27T15:00:20+00:00","dateModified":"2024-09-18T06:36:11+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/"},"wordCount":1226,"image":{"@id":"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/security-update-feature.jpg","keywords":["Cisco Cloudlock","Data Loss Prevention","Data Loss Prevention","travail hybride","WebexOne 2022"],"articleSection":["Collaboration","Uncategorized @fr"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/","url":"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/","name":"Les nouveaut\u00e9s Webex\u00a0Security\u00a0: octobre\u00a02022 | Webex Blog","isPartOf":{"@id":"https:\/\/blog.webex.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/#primaryimage"},"image":{"@id":"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/security-update-feature.jpg","datePublished":"2022-10-27T15:00:20+00:00","dateModified":"2024-09-18T06:36:11+00:00","author":{"@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/18c302625e0b77be3b663968df3e3da1"},"breadcrumb":{"@id":"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/#primaryimage","url":"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/security-update-feature.jpg","contentUrl":"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/10\/security-update-feature.jpg","width":980,"height":520,"caption":"#image_title"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.webex.com\/fr\/uncategorized-fr\/les-nouveautes-webex-security-octobre-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.webex.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Les nouveaut\u00e9s Webex\u00a0Security\u00a0: octobre\u00a02022"}]},{"@type":"WebSite","@id":"https:\/\/blog.webex.com\/es\/#website","url":"https:\/\/blog.webex.com\/es\/","name":"Webex Blog","description":"Webex by Cisco powers collaboration through industry-leading video conferencing, cloud calling and contact center solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.webex.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/18c302625e0b77be3b663968df3e3da1","name":"Raj Kumar","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/67dde7c1ffcd3c70c105fe41db99b330af419dd5838083afcb7db05f17ae1fe2?s=96&d=wp_user_avatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/67dde7c1ffcd3c70c105fe41db99b330af419dd5838083afcb7db05f17ae1fe2?s=96&d=wp_user_avatar&r=g","caption":"Raj Kumar"},"description":"Raj is Director of Product Management at Cisco Webex and responsible for the strategy, product management, and go to market for Webex Suite for US and Global Public Sector that includes Federal Civilian, State, Local and Education, and National Security and Defense. In addition, Raj also leads the strategy and product management of Webex commercial market expansion into new country\/region through data residency, sovereignty and sovereign clouds solutions, as well as encryption and key management technologies. Raj, previously, led the strategy and product management for the Identity platform, Security, Privacy &amp; Compliance, Partner ecosystem and established Webex as best-in-breed secure Collaboration platform. Raj has 15+ years of enterprise product management experience at leading technology companies, including Cisco, Microsoft, and Amazon. Raj holds a Master\u2019s degree in computer science from University of Florida and a Bachelor's degree in Electrical Engineering from Indian Institute of Technology (IIT).","url":"https:\/\/blog.webex.com\/fr\/contributors\/rajkumar\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/posts\/401436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/users\/5492"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/comments?post=401436"}],"version-history":[{"count":0,"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/posts\/401436\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/media\/399971"}],"wp:attachment":[{"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/media?parent=401436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/categories?post=401436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.webex.com\/fr\/wp-json\/wp\/v2\/tags?post=401436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}