{"id":3837,"date":"2019-07-04T16:45:38","date_gmt":"2019-07-04T20:45:38","guid":{"rendered":"http:\/\/www.nlyte.com\/fr\/faqs\/what-is-dcim-copy\/"},"modified":"2021-06-30T15:25:30","modified_gmt":"2021-06-30T19:25:30","slug":"quest-ce-que-la-gestion-des-actifs-informatiques","status":"publish","type":"page","link":"https:\/\/www.nlyte.com\/fr\/faqs\/quest-ce-que-la-gestion-des-actifs-informatiques\/","title":{"rendered":"Qu'est-ce que la gestion des actifs informatiques?"},"content":{"rendered":"<div class=\"kmdg-builder-content\"><div class=\"builder-font-controller\"><section id=\"\" class=\"builder-section builder-section-type--section builder-custom-theme builder-theme--theme-1 builder-section-padding-top-med builder-section-padding-bottom-med builder-layout-padding-med builder-font-normal   builder-valign-top       \" style=''><div class='builder-bg-image-wrap' style='height:100%'><div class='builder-img-bg loaded' style='background-image: url(https:\/\/www.nlyte.com\/fr\/web\/wp-content\/uploads\/2019\/07\/thinBanner_gray-1.jpg);opacity:1;background-position-y:center;' ><img src='https:\/\/www.nlyte.com\/fr\/web\/wp-content\/uploads\/2019\/07\/thinBanner_gray-1.jpg' alt='' role='presentation'><\/div><\/div><div class=\"builder-layouts-container\"><div class=\"builder-layout builder-layout-one-column \"><div class=\"builder-container\">\n<div class=\"builder-table\">\n    \n<div class=\"builder-column builder-column-type--column \">\n    <div class=\"builder-column-body\">\n        <div class=\"builder-content\">\n            \n\n\n<div class=\"builder-component builder-component-wysiwyg builder-component-index-1   builder-mobile-animation\" style=\"padding: 0% 0%;background-color: ;\">\n    <h1 style=\"text-align: center;\">Qu'est-ce que la gestion des actifs informatiques\u00a0?<\/h1>\n<\/div>\n        <\/div>\n    <\/div>\n<\/div><\/div>\n\n<\/div><\/div><\/div><\/section><section id=\"\" class=\"builder-section builder-section-type--section builder-custom-theme builder-theme--theme-0 builder-section-padding-top-high builder-section-padding-bottom-high builder-layout-padding-med builder-font-normal   builder-valign-top       \" style=''><div class=\"builder-layouts-container\"><div class=\"builder-layout builder-layout-two-thirds-column \"><div class=\"builder-container\">\n<div class=\"builder-table\">\n    \n<div class=\"builder-column builder-column-type--column \">\n    <div class=\"builder-column-body\">\n        <div class=\"builder-content\">\n            \n\n\n<div class=\"builder-component builder-component-wysiwyg builder-component-index-1   builder-mobile-animation\" style=\"padding: 0% 0%;background-color: ;\">\n    <p>La gestion des actifs informatiques (IT Asset Management\/ITAM) incluait traditionnellement des actifs tels que des serveurs, des ordinateurs centraux, des routeurs, des commutateurs, des pare-feu, des ordinateurs de bureau et des\u00a0ordinateurs\u00a0portables, des imprimantes et des logiciels - tous les \u00e9l\u00e9ments g\u00e9r\u00e9s par le service informatique. Mais la technologie ne consiste plus uniquement en actifs informatiques. Aujourd'hui, il existe des actifs technologiques non informatiques dans les organisations du monde entier.<\/p>\n<p class=\"p1\"><span class=\"s1\">Avec l\u2019essor de l\u2019Internet des objets (Internet of Things\/IoT), la technologie est omnipr\u00e9sente dans des \u00e9l\u00e9ments, notamment les syst\u00e8mes de chauffage, de ventilation et de climatisation (CVC), les p\u00e9riph\u00e9riques et capteurs, les cam\u00e9ras de s\u00e9curit\u00e9, les p\u00e9riph\u00e9riques m\u00e9dicaux, etc. - le tout connect\u00e9 \u00e0 Internet et appartenant \u00e0 diff\u00e9rents secteurs de l'entreprise. Ainsi, ITAM a \u00e9volu\u00e9 pour devenir Gestion des actifs technologiques (Technology Asset Management\/TAM).<\/span><\/p>\n<\/div>\n<div class=\"builder-component builder-component-divider-line builder-component-index-2   builder-mobile-animation\">\n    <div class=\"divider-line\" style=\"background-color: #ebebeb;height: 1px;\"><\/div>\n<\/div>\n\n\n<div class=\"builder-component builder-component-wysiwyg builder-component-index-3   builder-mobile-animation\" style=\"padding: 0% 0%;background-color: ;\">\n    <h2><span style=\"color: #106ea3;\">ITAM - TAM est-elle plus qu\u2019un outil de gestion des actifs logiciels\u00a0?<br \/>\n<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">Organisation internationale de normalisation (ISO) et Commission \u00e9lectrotechnique internationale (CEI) : l'ITAM est d\u00e9finie dans l'ISO\/CEI 19770 et aborde sp\u00e9cifiquement les d\u00e9fis modernes tels que la s\u00e9curit\u00e9 (conforme \u00e0 l'ISO\/CEI 27001), les services en nuage et l'informatique mobile, notamment\u00a0:<\/span><\/p>\n<ul>\n<li class=\"p1\"><span class=\"s1\">Logiciel<\/span><\/li>\n<li class=\"p1\"><span class=\"s1\">Supports\u00a0physiques et num\u00e9riques<\/span><\/li>\n<li class=\"p1\"><span class=\"s1\">\u00c9quipements informatiques physiques et virtuels<\/span><\/li>\n<li class=\"p1\"><span class=\"s1\">Licences (y compris preuve d'acquisition de licences)<\/span><\/li>\n<li class=\"p1\"><span class=\"s1\">Contrats<\/span><\/li>\n<\/ul>\n<p class=\"p1\"><span class=\"s1\">Actifs de gestion du syst\u00e8me ITAM (y compris syst\u00e8mes, outils et m\u00e9tadonn\u00e9es)<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Institut national des normes et de la technologie des \u00c9tats-Unis (U.S. National Institute of Standards and Technology\/NIST)\u00a0: La publication sp\u00e9ciale du NIST 1800-5 d\u00e9finit une approche et une architecture ITAM standard et reconna\u00eet que \u00ab l'ITAM\u00a0est le fondement d'une strat\u00e9gie de cybers\u00e9curit\u00e9 efficace \u00bb car elle \u00ab am\u00e9liore la visibilit\u00e9 des analystes de la s\u00e9curit\u00e9, ce qui conduit \u00e0 une meilleure utilisation des actifs et \u00e0 une meilleure s\u00e9curit\u00e9\u00a0\u00bb. Le cadre du NIST pour l'am\u00e9lioration de la cybers\u00e9curit\u00e9 des infrastructures essentielles\u00a0est organis\u00e9 en cinq fonctions principales :<\/span><\/p>\n<ul>\n<li class=\"p1\"><span class=\"s1\">Identifier<\/span><\/li>\n<li class=\"p1\"><span class=\"s1\">Prot\u00e9ger<\/span><\/li>\n<li class=\"p1\"><span class=\"s1\">D\u00e9tecter<\/span><\/li>\n<li class=\"p1\"><span class=\"s1\">R\u00e9pondre<\/span><\/li>\n<li class=\"p1\"><span class=\"s1\">R\u00e9cup\u00e9rer<\/span><\/li>\n<\/ul>\n<p class=\"p1\"><span class=\"s1\">Dans la fonction Identifier, la cat\u00e9gorie Gestion des actifs\u00a0est d\u00e9finie comme suit\u00a0: \u00ab Les donn\u00e9es, le personnel, les p\u00e9riph\u00e9riques, les syst\u00e8mes et les installations permettant \u00e0 l'organisation de r\u00e9aliser ses objectifs commerciaux sont identifi\u00e9s\u00a0et g\u00e9r\u00e9s conform\u00e9ment \u00e0 leur importance\u00a0relative pour les objectifs organisationnels\u00a0et la strat\u00e9gie de risque de l'organisation \u00bb.<\/span><\/p>\n<\/div>\n<div class=\"builder-component builder-component-divider-line builder-component-index-4   builder-mobile-animation\">\n    <div class=\"divider-line\" style=\"background-color: #ebebeb;height: 1px;\"><\/div>\n<\/div>\n\n\n<div class=\"builder-component builder-component-wysiwyg builder-component-index-5   builder-mobile-animation\" style=\"padding: 0% 0%;background-color: ;\">\n    <h2><span style=\"color: #106ea3;\">Qui utilise l'ITAM\u00a0?<br \/>\n<\/span><\/h2>\n<p>La TAM offre des avantages concrets pour de nombreux cas d'utilisation diff\u00e9rents dans les organisations, notamment :<\/p>\n<ul>\n<li><strong> Finances\u00a0et achats : <\/strong>\u00a0La\u00a0TAM aide les responsables des finances, des achats et des actifs \u00e0 n\u00e9gocier les achats et les renouvellements, \u00e0 rapprocher les rapports sur les immobilisations, \u00e0 \u00e9liminer les d\u00e9penses inutiles et \u00e0 valider la cession des actifs mis hors service.<\/li>\n<li><strong> S\u00e9curit\u00e9 et conformit\u00e9 : <\/strong>\u00a0La TAM identifie tout ce qui est reli\u00e9 au r\u00e9seau de l'organisation, fournissant des informations d\u00e9taill\u00e9es sur l'emplacement, la configuration, le suivi de l'accessibilit\u00e9 pour les modifications non planifi\u00e9es, les acc\u00e8s non autoris\u00e9s, les logiciels vuln\u00e9rables, les actifs perdus et ceux qui ne r\u00e9pondent plus, ainsi que le suivi d'audit du flux de travail pour GDPR, HIPAA, SOX, PCI DSS, et plus.<\/li>\n<li><strong> Op\u00e9rations informatiques : <\/strong>\u00a0TAM fournit une infrastructure informatique autonome en mettant \u00e0 jour les CMDB, DCIM et les syst\u00e8mes de gestion de b\u00e2timent (Building management systems\/BMS) avec des informations actuelles sur la configuration des actifs et sur l'emplacement, en am\u00e9liorant l'efficacit\u00e9 et les SLA pour les flux de travail de gestion des modifications et la gestion des centres\u00a0de services.<\/li>\n<\/ul>\n<\/div>\n<div class=\"builder-component builder-component-divider-line builder-component-index-6   builder-mobile-animation\">\n    <div class=\"divider-line\" style=\"background-color: #ebebeb;height: 1px;\"><\/div>\n<\/div><div class=\"builder-component builder-component-divider-line builder-component-index-7   builder-mobile-animation\">\n    <div class=\"divider-line\" style=\"background-color: #ebebeb;height: 1px;\"><\/div>\n<\/div>\n<div  class=\"builder-component builder-component-spacer builder-component-index-8   builder-mobile-animation\" style=\"padding: 3% 0 0 0;\"><\/div>\n\n\n<div class=\"builder-component builder-component-horizontal-buttons builder-component-index-9   builder-mobile-animation\">\n            <div class=\"buttons-row align-center\">\n                            <div class=\"single-button style-blue\">\n                                        <a href=\"https:\/\/www.nlyte.com\/fr\/faqs\/\"\n                       rel=\"\"\n                       target=\"_self\"\n                       style=\"width: px\">\n\n\n                                                    VOIR TOUTES LES FAQ                                            <\/a>\n\n                <\/div>\n                    <\/div>\n    <\/div>\n\n<div  class=\"builder-component builder-component-spacer builder-component-index-10   builder-mobile-animation\" style=\"padding: 1% 0 0 0;\"><\/div>\n        <\/div>\n    <\/div>\n<\/div>    \n<div class=\"builder-column builder-column-type--column \">\n    <div class=\"builder-column-body\">\n        <div class=\"builder-content\">\n            \n\n\n<div class=\"builder-component builder-component-wysiwyg builder-component-index-1   builder-mobile-animation\" style=\"padding: 0% 0%;background-color: ;\">\n    <h3 style=\"text-align: center;\">Demander une d\u00e9mo<\/h3>\n<\/div>\n\n<div class=\"builder-component builder-component-marketo-form builder-component-index-2   builder-mobile-animation\">\n    <form id=\"mktoForm_1851\" style=\"max-width: 100% !important;\"><\/form>\n    <script>\n        MktoForms2.loadForm(\"\/\/app-ab11.marketo.com\", \"690-OLN-597\", 1851, function(form) {\n            var $form = form.getFormElem();\n            var $btn = $form.find(\"button[type='submit']\");\n\n            if($form.parents(\".builder-section.footer_block\").length > 0) {\n                $form.attr(\"data-form-id\", \"zi-footer-form\");\n            } else {\n                $form.attr(\"data-form-id\", \"zi-main-form\");\n            }\n\n            \/\/ Change button type to normal button, and have it trigger submit via JS\n            $btn.attr(\"type\", \"button\").on(\"click\", function() {\n                form.submit();\n            });\n\n            \/\/ Make sure pressing enter submits the form\n            $form.find(\"input\").on(\"keyup\", function (e) {\n                if(e.which === 13) {\n                    form.submit();\n                }\n            });\n\n            form.onSuccess(function(vals, to) {\n                var email = vals.Email;\n\n                \/\/ Trigger ZI Formcomplete\n                if (window._zi_fc && typeof window._zi_fc.fcTriggerSubmit === 'function') {\n                    console.log(\"Sending to ZI\");\n                    try {\n                        window._zi_fc.fcTriggerSubmit();\n                    } catch (e) {\n                        console.log(\"Failed to send to ZI\");\n                        console.error(e);\n                    }\n                }\n\n                \/\/ Add submission to dataLayer\n                window.dataLayer.push({\n                    event: \"mktoLead\",\n                    mktoEmail: email,\n                    mktoFName: vals.FirstName,\n                    mktoLName: vals.LastName\n                });\n\n                \/\/ Redirect after 1 second to give things a chance to process\n                if(to) setTimeout(() => window.location.href = to, 1000);\n\n                \/\/ Don't use standard redirect method\n                return false;\n            });\n        });\n    <\/script>\n<\/div>        <\/div>\n    <\/div>\n<\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Qu'est-ce que la gestion des actifs informatiques\u00a0? La gestion des actifs informatiques (IT Asset Management\/ITAM) incluait traditionnellement des actifs tels que des serveurs, des ordinateurs centraux, des routeurs, des commutateurs, des pare-feu, des ordinateurs de&hellip;<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":3745,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.7 (Yoast SEO v21.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Qu&#039;est-ce que la gestion des actifs informatiques? | Nlyte<\/title>\n<meta name=\"description\" content=\"Apprenez-en plus sur la gestion des actifs informatiques et r\u00e9cup\u00e9rez un eBook de quelquesw sur ITAM for Dummies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nlyte.com\/fr\/faqs\/quest-ce-que-la-gestion-des-actifs-informatiques\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Qu&#039;est-ce que la gestion des actifs informatiques?\" \/>\n<meta property=\"og:description\" content=\"Apprenez-en plus sur la gestion des actifs informatiques et r\u00e9cup\u00e9rez un eBook de quelquesw sur ITAM for Dummies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nlyte.com\/fr\/faqs\/quest-ce-que-la-gestion-des-actifs-informatiques\/\" \/>\n<meta property=\"og:site_name\" content=\"Nlyte\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-30T19:25:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nlyte.com\/fr\/web\/wp-content\/uploads\/2019\/07\/thinBanner_gray-1.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/www.nlyte.com\/fr\/faqs\/quest-ce-que-la-gestion-des-actifs-informatiques\/\",\"url\":\"https:\/\/www.nlyte.com\/fr\/faqs\/quest-ce-que-la-gestion-des-actifs-informatiques\/\",\"name\":\"Qu'est-ce que la gestion des actifs informatiques? | Nlyte\",\"isPartOf\":{\"@id\":\"https:\/\/www.nlyte.com\/fr\/#website\"},\"datePublished\":\"2019-07-04T20:45:38+00:00\",\"dateModified\":\"2021-06-30T19:25:30+00:00\",\"description\":\"Apprenez-en plus sur la gestion des actifs informatiques et r\u00e9cup\u00e9rez un eBook de quelquesw sur ITAM for Dummies.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.nlyte.com\/fr\/faqs\/quest-ce-que-la-gestion-des-actifs-informatiques\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nlyte.com\/fr\/faqs\/quest-ce-que-la-gestion-des-actifs-informatiques\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.nlyte.com\/fr\/faqs\/quest-ce-que-la-gestion-des-actifs-informatiques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.nlyte.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FAQs\",\"item\":\"https:\/\/www.nlyte.com\/fr\/faqs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Qu'est-ce que la gestion des actifs informatiques?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nlyte.com\/fr\/#website\",\"url\":\"https:\/\/www.nlyte.com\/fr\/\",\"name\":\"Nlyte\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.nlyte.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nlyte.com\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nlyte.com\/fr\/#organization\",\"name\":\"Nlyte Software\",\"url\":\"https:\/\/www.nlyte.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nlyte.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nlyte.com\/fr\/web\/wp-content\/uploads\/2019\/05\/Nlyte_favicon.png\",\"contentUrl\":\"https:\/\/www.nlyte.com\/fr\/web\/wp-content\/uploads\/2019\/05\/Nlyte_favicon.png\",\"width\":476,\"height\":475,\"caption\":\"Nlyte Software\"},\"image\":{\"@id\":\"https:\/\/www.nlyte.com\/fr\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Qu'est-ce que la gestion des actifs informatiques? | Nlyte","description":"Apprenez-en plus sur la gestion des actifs informatiques et r\u00e9cup\u00e9rez un eBook de quelquesw sur ITAM for Dummies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nlyte.com\/fr\/faqs\/quest-ce-que-la-gestion-des-actifs-informatiques\/","og_locale":"en_US","og_type":"article","og_title":"Qu'est-ce que la gestion des actifs informatiques?","og_description":"Apprenez-en plus sur la gestion des actifs informatiques et r\u00e9cup\u00e9rez un eBook de quelquesw sur ITAM for Dummies.","og_url":"https:\/\/www.nlyte.com\/fr\/faqs\/quest-ce-que-la-gestion-des-actifs-informatiques\/","og_site_name":"Nlyte","article_modified_time":"2021-06-30T19:25:30+00:00","og_image":[{"url":"https:\/\/www.nlyte.com\/fr\/web\/wp-content\/uploads\/2019\/07\/thinBanner_gray-1.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["WebPage","FAQPage"],"@id":"https:\/\/www.nlyte.com\/fr\/faqs\/quest-ce-que-la-gestion-des-actifs-informatiques\/","url":"https:\/\/www.nlyte.com\/fr\/faqs\/quest-ce-que-la-gestion-des-actifs-informatiques\/","name":"Qu'est-ce que la gestion des actifs informatiques? | Nlyte","isPartOf":{"@id":"https:\/\/www.nlyte.com\/fr\/#website"},"datePublished":"2019-07-04T20:45:38+00:00","dateModified":"2021-06-30T19:25:30+00:00","description":"Apprenez-en plus sur la gestion des actifs informatiques et r\u00e9cup\u00e9rez un eBook de quelquesw sur ITAM for Dummies.","breadcrumb":{"@id":"https:\/\/www.nlyte.com\/fr\/faqs\/quest-ce-que-la-gestion-des-actifs-informatiques\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nlyte.com\/fr\/faqs\/quest-ce-que-la-gestion-des-actifs-informatiques\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.nlyte.com\/fr\/faqs\/quest-ce-que-la-gestion-des-actifs-informatiques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nlyte.com\/fr\/"},{"@type":"ListItem","position":2,"name":"FAQs","item":"https:\/\/www.nlyte.com\/fr\/faqs\/"},{"@type":"ListItem","position":3,"name":"Qu'est-ce que la gestion des actifs informatiques?"}]},{"@type":"WebSite","@id":"https:\/\/www.nlyte.com\/fr\/#website","url":"https:\/\/www.nlyte.com\/fr\/","name":"Nlyte","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.nlyte.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nlyte.com\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nlyte.com\/fr\/#organization","name":"Nlyte Software","url":"https:\/\/www.nlyte.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nlyte.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.nlyte.com\/fr\/web\/wp-content\/uploads\/2019\/05\/Nlyte_favicon.png","contentUrl":"https:\/\/www.nlyte.com\/fr\/web\/wp-content\/uploads\/2019\/05\/Nlyte_favicon.png","width":476,"height":475,"caption":"Nlyte Software"},"image":{"@id":"https:\/\/www.nlyte.com\/fr\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.nlyte.com\/fr\/wp-json\/wp\/v2\/pages\/3837"}],"collection":[{"href":"https:\/\/www.nlyte.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nlyte.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nlyte.com\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nlyte.com\/fr\/wp-json\/wp\/v2\/comments?post=3837"}],"version-history":[{"count":23,"href":"https:\/\/www.nlyte.com\/fr\/wp-json\/wp\/v2\/pages\/3837\/revisions"}],"predecessor-version":[{"id":18723,"href":"https:\/\/www.nlyte.com\/fr\/wp-json\/wp\/v2\/pages\/3837\/revisions\/18723"}],"up":[{"embeddable":true,"href":"https:\/\/www.nlyte.com\/fr\/wp-json\/wp\/v2\/pages\/3745"}],"wp:attachment":[{"href":"https:\/\/www.nlyte.com\/fr\/wp-json\/wp\/v2\/media?parent=3837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}