{"id":15434,"date":"2019-09-20T12:34:59","date_gmt":"2019-09-20T16:34:59","guid":{"rendered":"http:\/\/www.nlyte.com\/fr\/?page_id=15434"},"modified":"2020-03-03T13:36:57","modified_gmt":"2020-03-03T17:36:57","slug":"risk-mitigation-and-security","status":"publish","type":"page","link":"https:\/\/www.nlyte.com\/fr\/risk-mitigation-and-security\/","title":{"rendered":"Risk Mitigation and Security"},"content":{"rendered":"<div class=\"kmdg-builder-content\"><div class=\"builder-font-controller\"><section id=\"\" class=\"builder-section builder-section-type--section builder-custom-theme builder-theme--theme-1 builder-section-padding-top-med builder-section-padding-bottom-med builder-layout-padding-med builder-font-normal   builder-valign-top       \" style=''><div class='builder-bg-image-wrap' style='height:100%'><div class='builder-img-bg loaded' style='background-image: url(https:\/\/www.nlyte.com\/fr\/web\/wp-content\/uploads\/2019\/07\/thinBanner_gray-1.jpg);opacity:1;background-position-y:center;' ><img src='https:\/\/www.nlyte.com\/fr\/web\/wp-content\/uploads\/2019\/07\/thinBanner_gray-1.jpg' alt='' role='presentation'><\/div><\/div><div class=\"builder-layouts-container\"><div class=\"builder-layout builder-layout-one-column \"><div class=\"builder-container\">\n<div class=\"builder-table\">\n    \n<div class=\"builder-column builder-column-type--column \">\n    <div class=\"builder-column-body\">\n        <div class=\"builder-content\">\n            \n\n\n<div class=\"builder-component builder-component-wysiwyg builder-component-index-1   builder-mobile-animation\" style=\"padding: 0% 0%;background-color: ;\">\n    <h1 style=\"text-align: center;\">Risk Mitigation and Security<\/h1>\n<\/div>\n        <\/div>\n    <\/div>\n<\/div><\/div>\n\n<\/div><\/div><\/div><\/section><section id=\"\" class=\"builder-section builder-section-type--section builder-custom-theme builder-theme--theme-0 builder-section-padding-top-high builder-section-padding-bottom-high builder-layout-padding-med builder-font-normal   builder-valign-top       \" style=''><div class=\"builder-layouts-container\"><div class=\"builder-layout builder-layout-one-column \"><div class=\"builder-container\">\n<div class=\"builder-table\">\n    \n<div class=\"builder-column builder-column-type--column \">\n    <div class=\"builder-column-body\">\n        <div class=\"builder-content\">\n            \n\n\n<div class=\"builder-component builder-component-wysiwyg builder-component-index-1   builder-mobile-animation\" style=\"padding: 0% 0%;background-color: ;\">\n    <p>Reducing risk and bolstering your security protocols are critical in maintaining a safe and compliant data center. Nlyte takes great pride in helping you achieve these goals. Nlyte was the first DCIM vendor to become\u00a0<a href=\"https:\/\/www.veracode.com\/verified\/directory\/nlyte-software\" target=\"_blank\" rel=\"noopener\">Vericode Verified<\/a>, ensuring our code meets one of the industry\u2019s most stringent tests for validating software development security.<\/p>\n<p>Earlier this year we were recognized by the\u00a0<a href=\"https:\/\/www.dhs.gov\/cdm\" target=\"_blank\" rel=\"noopener\">US Department of Homeland Security<\/a>\u00a0as meeting Phase 1 criteria of the Continuous Diagnostics and Mitigation (CDM) program. Nlyte DCIM and ITAM solutions are recognized to provide adequate, risk-based, and cost-effective cybersecurity as well as more efficiently allocate cybersecurity resources.<\/p>\n<p>With Nlyte\u2019s latest release 10.3 SAML v2.0 is now supported providing single sign on login across security domains. To begin using SAML v2.0 contact your Nlyte Support team to get the setup whitepaper.<\/p>\n<p>To learn about other ways Nlyte helps you reduce risk and tighten security across your compute infrastructure visit our Asset Integrity Monitoring Solutions page at\u00a0<a href=\"https:\/\/www.nlyte.com\/fr\/solutions\/asset-integrity-monitoring\/\">Asset Integrity Monitoring<\/a><\/p>\n<\/div>\n\n<div  class=\"builder-component builder-component-spacer builder-component-index-2   builder-mobile-animation\" style=\"padding: 2% 0 0 0;\"><\/div>\n        <\/div>\n    <\/div>\n<\/div><\/div>\n\n<\/div><\/div><\/div><\/section><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Risk Mitigation and Security Reducing risk and bolstering your security protocols are critical in maintaining a safe and compliant data center. Nlyte takes great pride in helping you achieve these goals. Nlyte was the first&hellip;<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.7 (Yoast SEO v21.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Risk Mitigation and Security | Nlyte<\/title>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risk Mitigation and Security\" \/>\n<meta property=\"og:description\" content=\"Risk Mitigation and Security Reducing risk and bolstering your security protocols are critical in maintaining a safe and compliant data center. Nlyte takes great pride in helping you achieve these goals. Nlyte was the first&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nlyte.com\/fr\/risk-mitigation-and-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Nlyte\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-03T17:36:57+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nlyte.com\/fr\/risk-mitigation-and-security\/\",\"url\":\"https:\/\/www.nlyte.com\/fr\/risk-mitigation-and-security\/\",\"name\":\"Risk Mitigation and Security | Nlyte\",\"isPartOf\":{\"@id\":\"https:\/\/www.nlyte.com\/fr\/#website\"},\"datePublished\":\"2019-09-20T16:34:59+00:00\",\"dateModified\":\"2020-03-03T17:36:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.nlyte.com\/fr\/risk-mitigation-and-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nlyte.com\/fr\/risk-mitigation-and-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.nlyte.com\/fr\/risk-mitigation-and-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.nlyte.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Risk Mitigation and Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nlyte.com\/fr\/#website\",\"url\":\"https:\/\/www.nlyte.com\/fr\/\",\"name\":\"Nlyte\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.nlyte.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nlyte.com\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nlyte.com\/fr\/#organization\",\"name\":\"Nlyte Software\",\"url\":\"https:\/\/www.nlyte.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nlyte.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nlyte.com\/fr\/web\/wp-content\/uploads\/2019\/05\/Nlyte_favicon.png\",\"contentUrl\":\"https:\/\/www.nlyte.com\/fr\/web\/wp-content\/uploads\/2019\/05\/Nlyte_favicon.png\",\"width\":476,\"height\":475,\"caption\":\"Nlyte Software\"},\"image\":{\"@id\":\"https:\/\/www.nlyte.com\/fr\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Risk Mitigation and Security | Nlyte","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"Risk Mitigation and Security","og_description":"Risk Mitigation and Security Reducing risk and bolstering your security protocols are critical in maintaining a safe and compliant data center. Nlyte takes great pride in helping you achieve these goals. Nlyte was the first&hellip;","og_url":"https:\/\/www.nlyte.com\/fr\/risk-mitigation-and-security\/","og_site_name":"Nlyte","article_modified_time":"2020-03-03T17:36:57+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nlyte.com\/fr\/risk-mitigation-and-security\/","url":"https:\/\/www.nlyte.com\/fr\/risk-mitigation-and-security\/","name":"Risk Mitigation and Security | Nlyte","isPartOf":{"@id":"https:\/\/www.nlyte.com\/fr\/#website"},"datePublished":"2019-09-20T16:34:59+00:00","dateModified":"2020-03-03T17:36:57+00:00","breadcrumb":{"@id":"https:\/\/www.nlyte.com\/fr\/risk-mitigation-and-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nlyte.com\/fr\/risk-mitigation-and-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.nlyte.com\/fr\/risk-mitigation-and-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nlyte.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Risk Mitigation and Security"}]},{"@type":"WebSite","@id":"https:\/\/www.nlyte.com\/fr\/#website","url":"https:\/\/www.nlyte.com\/fr\/","name":"Nlyte","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.nlyte.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nlyte.com\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nlyte.com\/fr\/#organization","name":"Nlyte Software","url":"https:\/\/www.nlyte.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nlyte.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.nlyte.com\/fr\/web\/wp-content\/uploads\/2019\/05\/Nlyte_favicon.png","contentUrl":"https:\/\/www.nlyte.com\/fr\/web\/wp-content\/uploads\/2019\/05\/Nlyte_favicon.png","width":476,"height":475,"caption":"Nlyte Software"},"image":{"@id":"https:\/\/www.nlyte.com\/fr\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.nlyte.com\/fr\/wp-json\/wp\/v2\/pages\/15434"}],"collection":[{"href":"https:\/\/www.nlyte.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nlyte.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nlyte.com\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nlyte.com\/fr\/wp-json\/wp\/v2\/comments?post=15434"}],"version-history":[{"count":6,"href":"https:\/\/www.nlyte.com\/fr\/wp-json\/wp\/v2\/pages\/15434\/revisions"}],"predecessor-version":[{"id":19109,"href":"https:\/\/www.nlyte.com\/fr\/wp-json\/wp\/v2\/pages\/15434\/revisions\/19109"}],"wp:attachment":[{"href":"https:\/\/www.nlyte.com\/fr\/wp-json\/wp\/v2\/media?parent=15434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}