{"id":44506,"date":"2018-02-01T00:00:00","date_gmt":"2018-02-01T00:00:00","guid":{"rendered":"https:\/\/www.colt.net\/resources\/securisation-dun-reseau-iot\/"},"modified":"2018-02-01T00:00:00","modified_gmt":"2018-02-01T00:00:00","slug":"securisation-dun-reseau-iot","status":"publish","type":"post","link":"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/","title":{"rendered":"S\u00e9curisation de l&#8217;internet des objets"},"content":{"rendered":"<p>Nous assistons en ce moment \u00e0 une v\u00e9ritable m\u00e9tamorphose de l\u2019Internet avec l\u2019\u00e9mergence d\u2019un \u00e9cosyst\u00e8me appel\u00e9 commun\u00e9ment Internet des objets qui relie d\u00e9sormais l\u2019interaction d\u2019un nombre croissant d\u2019objets connect\u00e9s. Ces objets se muent de plus en plus en capteurs d&#8217;informations interconnect\u00e9s, introduisant de nouveaux usages. Depuis plusieurs ann\u00e9es, Internet s\u2019\u00e9tend sous de nouvelles formes. Avec plus de 31 % d\u2019objets connect\u00e9s en 2017, l\u2019Internet des Objets (IoT) fait aujourd\u2019hui partie de notre quotidien. L&#8217;explosion de l&#8217;internet des objets est telle que le nombre d&#8217;appareils d\u00e9ploy\u00e9s et utilis\u00e9s devrait d\u00e9passer la population mondiale cette ann\u00e9e. Les analystes de Gartner pr\u00e9voient m\u00eame que plus de 20 milliards d&#8217;appareils de l&#8217;internet des objets seront en circulation d&#8217;ici 2020. <\/p>\n<p>Cette \u00e9volution soul\u00e8ve de nombreuses questions concernant la croissance \u00e9conomique et les mutations sociales, mais aussi et surtout des questions de s\u00e9curit\u00e9, auxquelles les entreprises devront au plus t\u00f4t r\u00e9pondre. Des vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 signal\u00e9es dans diff\u00e9rents produits de l&#8217;internet des objets, notamment des cam\u00e9ras connect\u00e9es, des chauffages via des compteurs intelligents, des routeurs, etc. Les attaques IoT ont notamment explos\u00e9 de 280 % au premier semestre 2017. Or, ce march\u00e9 est en plein de boom !<\/p>\n<p>L\u2019IoT est-il vraiment le levier de croissance id\u00e9al en termes de ratio b\u00e9n\u00e9fice\/risque ? Il est difficile de r\u00e9pondre \u00e0 cette question sans se heurter au probl\u00e8me \u00e9pineux d\u2019\u00e9valuer l\u2019importance d\u2019une approche cumulant \u2018Security by Design\u2019 \u2013 permettant de limiter les failles d\u00e8s la conception d\u2019un r\u00e9seau \u2013 et des techniques de chiffrement et d\u2019analyse m\u00e9trologique. L\u2019ensemble permet la protection compl\u00e8te du r\u00e9seau, qu\u2019il soit sp\u00e9cialement con\u00e7u pour l\u2019IoT ou qu\u2019il lui soit adjoint des objets connect\u00e9s dans le futur.<\/p>\n<p><strong>L\u2019importance d\u2019un r\u00e9seau s\u00e9curis\u00e9 nativement<\/strong><br \/>\nLes r\u00e9seaux de fibre optique apportent une protection de base d\u00e8s leur installation. Ils sont enterr\u00e9s, voire immerg\u00e9s, et emp\u00eachent ainsi les branchements sauvages. Or, ce sont justement ces derniers qui portent sur les donn\u00e9es de l\u2019entreprise les premiers risques de fuite, d\u2019intrusion ou de piratage. Les points de branchement restent donc \u00e0 prot\u00e9ger.<\/p>\n<p>Avec les objets connect\u00e9s se pose \u00e9galement la question de la s\u00e9curit\u00e9 des donn\u00e9es. Pour mesurer la s\u00e9curit\u00e9 d\u2019un r\u00e9seau, l\u2019entreprise ne doit pas h\u00e9siter \u00e0 auditer son fournisseur IoT et \u00e0 recourir \u00e0 des services sp\u00e9cialis\u00e9s pour v\u00e9rifier la conformit\u00e9 de ces objets apr\u00e8s achat et avant leur connexion au r\u00e9seau. Trop nombreuses sont celles qui ouvrent des br\u00e8ches \u00e0 l\u2019espionnage industriel en connectant sans pr\u00e9caution de nouveaux terminaux corrompus \u00e0 leur propre r\u00e9seau. Ce n\u2019est qu\u2019en prenant des mesures concr\u00e8tes que les entreprises pourront s\u2019appuyer sur un r\u00e9seau \u2018Secure by Design\u2019, dont l\u2019infrastructure m\u00eame sera un gage de s\u00e9curit\u00e9.<\/p>\n<p><strong>Prot\u00e9ger les donn\u00e9es des objets connect\u00e9s propri\u00e9taires<\/strong><br \/>\nLes objets connect\u00e9s en fonctionnement, \u00e9changent des donn\u00e9es entre eux et les synchronisent avec la base de l\u2019entreprise. C\u2019est cette derni\u00e8re qui doit alors \u00eatre crypt\u00e9e pour emp\u00eacher les connexions non autoris\u00e9es de d\u00e9boucher vers une fuite ou un vol de donn\u00e9es. Des solutions simples existent pour soutenir l\u2019entreprise dans la protection de ce type de donn\u00e9es.<\/p>\n<p>Les Hardware Security Modules (HSM) s\u2019installent directement dans le datacenter qui les h\u00e9berge pour que les donn\u00e9es soient crypt\u00e9es par d\u00e9faut. Aucun objet connect\u00e9 ne peut alors y acc\u00e9der sans avoir \u00e9t\u00e9 autoris\u00e9 au pr\u00e9alable et dot\u00e9 de la cl\u00e9 de d\u00e9chiffrement correspondante. Plus g\u00e9n\u00e9ralement, la blockchain se pose comme une solution d\u2019avenir : les registres inalt\u00e9rables qui la caract\u00e9risent, doubl\u00e9s d\u2019un cryptage par d\u00e9faut, rendent inutilisables les donn\u00e9es \u00e9ventuellement d\u00e9rob\u00e9es. L\u2019entreprise doit avoir conscience que chaque objet connect\u00e9 est une faille potentielle, qu\u2019il s\u2019agit d\u2019un acc\u00e8s qu\u2019il faut prot\u00e9ger en permanence.<\/p>\n<p><strong>Comment d\u00e9tecter un objet connect\u00e9 infect\u00e9 parmi des milliers d\u2019autres ?<\/strong><br \/>\nDans un r\u00e9seau IoT, les interactions se comptent par millions. La protection des donn\u00e9es requiert ainsi une attention minutieuse port\u00e9e aux d\u00e9tails : c\u2019est ici qu\u2019intervient l\u2019analyse m\u00e9trologique. En effet, plus le nombre d\u2019objets connect\u00e9s augmente, plus le management d\u2019un r\u00e9seau devient complexe, et les premiers signes d\u2019une faille ou cyberattaque peuvent alors passer inaper\u00e7us.<\/p>\n<p>La m\u00e9trologie est la science informatique de la mesure, elle implique une analyse extr\u00eamement fine aux signaux les plus faibles. Quand tous les indicateurs semblent \u00eatre au vert, c\u2019est cette v\u00e9rification associant Big Data et regard humain qui fait la diff\u00e9rence. La m\u00e9trologie se pose alors comme contrepoids d\u2019une intelligence artificielle avec un potentiel de perfectionnement.<\/p>\n<p>D\u00e8s lors qu\u2019une entreprise n\u00e9glige la cybers\u00e9curit\u00e9 de son r\u00e9seau, qui rassemble ses objets connect\u00e9s et supporte leur fonctionnement, l\u2019Internet des Objets ne repr\u00e9sente pas une r\u00e9elle opportunit\u00e9. Si une strat\u00e9gie de s\u00e9curisation n\u2019est pas pens\u00e9e d\u00e8s la mise en place m\u00eame du r\u00e9seau IoT, les donn\u00e9es sont totalement ouvertes et vuln\u00e9rables aux cybercriminels. A l\u2019heure o\u00f9 l\u2019ensemble des entreprises, europ\u00e9ennes en t\u00eate, acc\u00e9l\u00e8rent leur mise en conformit\u00e9 au RGPD (R\u00e8glement G\u00e9n\u00e9ral sur la Protection des Donn\u00e9es), la s\u00e9curit\u00e9 des r\u00e9seaux et de l\u2019IoT est un enjeu d\u00e9terminant \u00e0 la protection de l\u2019ensemble des donn\u00e9es.<\/p>\n<p>Source : Gartner: <a href=\"https:\/\/www.zdnet.com\/article\/iot-devices-will-outnumber-the-worlds-population-this-year-for-the-first-time\/\">IoT devices will outnumber the world&#8217;s population this year for the first time <\/a><br \/>\nSource : <a href=\"https:\/\/f5.com\/Portals\/1\/PDF\/labs\/F5_Labs_Hunt_for_IOT_Vol_3_rev09AUG17.pdf?ver=2017-08-09-112721-777\">The Rise of Thingbots<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article about the \u200bIoT devices and the securisation of the network. Those are the main driver today and will account for 5.2 billion units in 2017.<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"colt_type":[1487],"colt_ind":[1212,1252],"colt_products":[1260,1498],"colt_solutions":[],"class_list":["post-44506","post","type-post","status-publish","format-standard","hentry","colt_type-blog-fr","colt_ind-business-fr","colt_ind-technology-fr","colt_products-colt-business-connect-fr","colt_products-cloud-connect-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curisation de l&#039;internet des objets - Colt Technology Services<\/title>\n<meta name=\"description\" content=\"Article about the \u200bIoT devices and the securisation of the network. Those are the main driver today and will account for 5.2 billion units in 2017.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curisation de l&#039;internet des objets - Colt Technology Services\" \/>\n<meta property=\"og:description\" content=\"Article about the \u200bIoT devices and the securisation of the network. Those are the main driver today and will account for 5.2 billion units in 2017.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/\" \/>\n<meta property=\"og:site_name\" content=\"Colt Technology Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ColtTechnologyServices\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-01T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2021\/01\/Brand-2021-Stock-41.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Robert Ba\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@colt_technology\" \/>\n<meta name=\"twitter:site\" content=\"@colt_technology\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robert Ba\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/\"},\"author\":{\"name\":\"Robert Ba\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/b52e42bb2cb7da752a39308bf6dfd29c\"},\"headline\":\"S\u00e9curisation de l&#8217;internet des objets\",\"datePublished\":\"2018-02-01T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/\"},\"wordCount\":1014,\"publisher\":{\"@id\":\"https:\/\/legacy.colt.net\/#organization\"},\"articleSection\":[\"General\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/\",\"url\":\"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/\",\"name\":\"S\u00e9curisation de l'internet des objets - Colt Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/legacy.colt.net\/#website\"},\"datePublished\":\"2018-02-01T00:00:00+00:00\",\"description\":\"Article about the \u200bIoT devices and the securisation of the network. Those are the main driver today and will account for 5.2 billion units in 2017.\",\"breadcrumb\":{\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/legacy.colt.net\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\/\/legacy.colt.net\/fr\/resources\/type\/blog-fr\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"S\u00e9curisation de l&#8217;internet des objets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/legacy.colt.net\/#website\",\"url\":\"https:\/\/legacy.colt.net\/\",\"name\":\"Colt\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30b5\u30fc\u30d3\u30b9\u682a\u5f0f\u4f1a\u793e\",\"description\":\"Managed Network &amp; Voice Services Provider\",\"publisher\":{\"@id\":\"https:\/\/legacy.colt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/legacy.colt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/legacy.colt.net\/#organization\",\"name\":\"Colt Technology Services\",\"url\":\"https:\/\/legacy.colt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png\",\"contentUrl\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png\",\"width\":195,\"height\":77,\"caption\":\"Colt Technology Services\"},\"image\":{\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ColtTechnologyServices\/\",\"https:\/\/x.com\/colt_technology\",\"https:\/\/www.instagram.com\/colttechnologyservices\/\",\"https:\/\/www.linkedin.com\/company\/colt-technology-services\",\"https:\/\/www.youtube.com\/user\/ColtTechnology\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/b52e42bb2cb7da752a39308bf6dfd29c\",\"name\":\"Robert Ba\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ec258f338241acab715f7f4666b716a74823ba6b4ec18774d9d5af0cc27545bd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ec258f338241acab715f7f4666b716a74823ba6b4ec18774d9d5af0cc27545bd?s=96&d=mm&r=g\",\"caption\":\"Robert Ba\"},\"description\":\"Colt provide world class network and voice connectivity to businesses in Europe, Asia and the US.\",\"url\":\"https:\/\/legacy.colt.net\/fr\/resources\/author\/robertba\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curisation de l'internet des objets - Colt Technology Services","description":"Article about the \u200bIoT devices and the securisation of the network. Those are the main driver today and will account for 5.2 billion units in 2017.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curisation de l'internet des objets - Colt Technology Services","og_description":"Article about the \u200bIoT devices and the securisation of the network. Those are the main driver today and will account for 5.2 billion units in 2017.","og_url":"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/","og_site_name":"Colt Technology Services","article_publisher":"https:\/\/www.facebook.com\/ColtTechnologyServices\/","article_published_time":"2018-02-01T00:00:00+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2021\/01\/Brand-2021-Stock-41.jpg","type":"image\/jpeg"}],"author":"Robert Ba","twitter_card":"summary_large_image","twitter_creator":"@colt_technology","twitter_site":"@colt_technology","twitter_misc":{"Written by":"Robert Ba","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/#article","isPartOf":{"@id":"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/"},"author":{"name":"Robert Ba","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/b52e42bb2cb7da752a39308bf6dfd29c"},"headline":"S\u00e9curisation de l&#8217;internet des objets","datePublished":"2018-02-01T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/"},"wordCount":1014,"publisher":{"@id":"https:\/\/legacy.colt.net\/#organization"},"articleSection":["General"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/","url":"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/","name":"S\u00e9curisation de l'internet des objets - Colt Technology Services","isPartOf":{"@id":"https:\/\/legacy.colt.net\/#website"},"datePublished":"2018-02-01T00:00:00+00:00","description":"Article about the \u200bIoT devices and the securisation of the network. Those are the main driver today and will account for 5.2 billion units in 2017.","breadcrumb":{"@id":"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/legacy.colt.net\/fr\/resources\/securisation-dun-reseau-iot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/legacy.colt.net\/fr\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/legacy.colt.net\/fr\/resources\/type\/blog-fr\/"},{"@type":"ListItem","position":3,"name":"S\u00e9curisation de l&#8217;internet des objets"}]},{"@type":"WebSite","@id":"https:\/\/legacy.colt.net\/#website","url":"https:\/\/legacy.colt.net\/","name":"Colt\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30b5\u30fc\u30d3\u30b9\u682a\u5f0f\u4f1a\u793e","description":"Managed Network &amp; Voice Services Provider","publisher":{"@id":"https:\/\/legacy.colt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/legacy.colt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/legacy.colt.net\/#organization","name":"Colt Technology Services","url":"https:\/\/legacy.colt.net\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/","url":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png","contentUrl":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png","width":195,"height":77,"caption":"Colt Technology Services"},"image":{"@id":"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ColtTechnologyServices\/","https:\/\/x.com\/colt_technology","https:\/\/www.instagram.com\/colttechnologyservices\/","https:\/\/www.linkedin.com\/company\/colt-technology-services","https:\/\/www.youtube.com\/user\/ColtTechnology"]},{"@type":"Person","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/b52e42bb2cb7da752a39308bf6dfd29c","name":"Robert Ba","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ec258f338241acab715f7f4666b716a74823ba6b4ec18774d9d5af0cc27545bd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ec258f338241acab715f7f4666b716a74823ba6b4ec18774d9d5af0cc27545bd?s=96&d=mm&r=g","caption":"Robert Ba"},"description":"Colt provide world class network and voice connectivity to businesses in Europe, Asia and the US.","url":"https:\/\/legacy.colt.net\/fr\/resources\/author\/robertba\/"}]}},"_links":{"self":[{"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/posts\/44506","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/comments?post=44506"}],"version-history":[{"count":0,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/posts\/44506\/revisions"}],"wp:attachment":[{"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/media?parent=44506"}],"wp:term":[{"taxonomy":"colt_type","embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/colt_type?post=44506"},{"taxonomy":"colt_ind","embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/colt_ind?post=44506"},{"taxonomy":"colt_products","embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/colt_products?post=44506"},{"taxonomy":"colt_solutions","embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/colt_solutions?post=44506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}