{"id":5517,"date":"2019-02-21T19:46:15","date_gmt":"2019-02-21T19:46:15","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5517"},"modified":"2021-07-09T16:01:22","modified_gmt":"2021-07-09T15:01:22","slug":"ossim-open-source-siem-overview","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview","title":{"rendered":"SIEM Open Source Overview"},"content":{"rendered":"<div class=\"field field--name-body field--type-text-with-summary field--label-hidden field--item\">\n<p>Enterprises today face an alarming array of\u00a0cybersecurity threats. From DDoS attacks and malware to phishing and SQL injections, businesses must contend with the daily risks of cybercrime\u2014risks that are evolving as bad actors become better organized and more sophisticated.<\/p>\n<p>While no organization can guarantee that it won\u2019t be the victim of some kind of malicious online activity, it\u2019s still incumbent upon key stakeholders to do everything possible to protect their networks, systems, and data from attacks and breaches. With cybercrime costing the worldwide economy\u00a0<a class=\"ext\" href=\"https:\/\/www.csis.org\/analysis\/economic-impact-cybercrime\" target=\"_blank\" rel=\"noopener noreferrer\">$600 billion every year<\/a>\u2014about one percent of global GDP\u2014the pressure is on to find the best solutions to help ward off the worst digital threats.<\/p>\n<p>As with every technological solution, the best option for your clients will inevitably depend on a confluence of factors unique to their business. For instance, if the organization operates in fields vital to national security, such as oil and natural gas production or defense technologies, you\u2019ll need to provide a cybersecurity architecture well-suited to historic digital threats\u2014from hostile foreign governments to organized cybercrime rings\u2014that target those sectors.<\/p>\n<p>Accordingly, the business will need assistance with both crisis management and long-term data security. In broad strokes, this means cybersecurity solutions that simultaneously warn you of current attacks on the system and comb through data to monitor for ongoing, less noticeable irregularities will be well-suited to support your clients.<\/p>\n<p>For many organizations, SIEM tools accomplish just that. If you\u2019re preparing to introduce new cybersecurity software and looking for a solution that can be as flexible as possible to fit the evolving needs of any business, consider how SIEM platforms could support your\u00a0cybersecurity strategy.<\/p>\n<h3><b>What is a SIEM tool?<\/b><\/h3>\n<p>Security information and event management, or SIEM, has become a key strategy in broader cybersecurity efforts. In it, two kinds of security tools are combined. On one hand, security event management (SEM) software alerts your team when your systems are currently under attack or likely to face one soon. On the other, security information management (SIM) programs trawl through information produced by your digital environment to identify issues that may point to hard-to-detect malicious activity.<img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive alignleft\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/SIEM%20Body.jpg\" alt=\"\" width=\"439\" height=\"217\" align=\"Left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/><\/p>\n<p>In order to manage this twinned set of responsibilities, SIEM tools typically include three main functionalities. First, data collection gathers the information generated\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/how-to-design-a-network\" target=\"_blank\" rel=\"noopener\">throughout your network<\/a>\u00a0so that SIEM platforms have it available for further observation. Second, data storage takes that information and protects it, simultaneously guarding it against outside interference and preserving it in case you need it. Lastly, data analysis takes the information that\u2019s been collected and stored and runs it through sophisticated tools designed to identify and raise any potential issues.<\/p>\n<p>Taken together, these functions provide IT professionals with considerable insight into the goings on of the network and systems and aid the protection of proprietary data. By including a central dashboard designed to provide users with clear-cut status updates into system security, SIEM tools make it possible for IT operations to exert full control over their cybersecurity.<\/p>\n<h3><b>The drawbacks of open source SIEM tools<\/b><\/h3>\n<p>SIEM tools are available in both commercial and open source options. In some cases, businesses may select a more budget-friendly open source SIEM solution, but this can actually pose a security risk. Meanwhile, commercial options tend to be more user-friendly, with an array of capabilities and ongoing customer support.<img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive alignright\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/SIEMOpenSource_Facebook.png\" alt=\"\" width=\"437\" height=\"229\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/><\/p>\n<p>Some businesses will want to explore SIEM open source tools like OSSIM, which may offer cost savings over commercial tools. Without the support built into a commercial variant, however, it\u2019s up to you and your team to ensure you install the platform properly and troubleshoot any errors that arise out of the initial installation process. Open source tools tend to be much more hands-on, which can allow for customization but also requires a specific skill set to ensure you\u2019re making the most of open source features. Since open source tools lack the level of support that comes with paid options, it\u2019s imperative that managed services providers (MSPs) provide the hands-on attention needed to effectively protect the business. No open source SIEM platform can currently offer the full range of capabilities, and businesses may need to combine two or more platforms for full protection.<\/p>\n<p>It\u2019s also worth noting that open source SIEM software can actually be more vulnerable to security risks. These products have short release cycles, and it\u2019s the user\u2019s responsibility to stay on top of the latest patches and updates. Although open source programs have many users who could theoretically catch flaws, these individuals aren\u2019t necessarily security experts and many bugs slip by unnoticed. Open source frameworks may even have vulnerabilities built in, especially if the program incorporates third-party tools. Overall, businesses must be careful when implementing open source software\u2014which may defeat the purpose of choosing a SIEM tool to begin with.<\/p>\n<\/div>\n<div class=\"field field--name-field-blog-paragraphs field--type-entity-reference-revisions field--label-hidden field--items\">\n<div class=\"field--item\">\n<div class=\"paragraph paragraph--type--blog-section paragraph--view-mode--default clearfix\">\n<div class=\"sidebar-width-33\">\n<div class=\"field field--name-field-sidebar field--type-entity-reference-revisions field--label-hidden field--item\">\n<aside class=\"paragraph-align-right pull-right paragraph paragraph--type--blog-cta paragraph--view-mode--default\">\n<div class=\"explore-box quick-cta\">\n<div id=\"solar-features-trial\"><b>Commercial SIEM: What are the benefits?\u00a0<\/b><\/div>\n<\/div>\n<\/aside>\n<\/div>\n<\/div>\n<div class=\"blog-section-content\">\n<p>If a business isn\u2019t comfortable with the extra effort and risks involved in open source SIEMs, they may wish to consider a commercial alternative. Many of these platforms come with a free trial, so businesses have time to decide if a particular solution is the right fit. Although commercial SIEM tools do require a financial investment, businesses can rest assured knowing these tools offer comprehensive SIEM capabilities and are built by experts to meet industry compliance standards. Commercial tools provide the in-depth protection enterprises need\u2014they can even scan USB flash drives. And of course, ongoing customer support provides invaluable peace of mind for any business looking to fully protect its interests.<\/p>\n<h3><b>Additional SIEM considerations<\/b><\/h3>\n<p>IT pros and MSPs should make sure they select a commercial SIEM solution that has been designed to support their organization\u2019s digital environment, as some SIEMs are appropriate for on-premises infrastructure, while others are built for use within a cloud infrastructure. SolarWinds offers SIEM solutions designed for both on-premises and cloud environments: our\u00a0<a class=\"ext\" href=\"https:\/\/www.solarwinds.com\/log-event-manager-software\" target=\"_blank\" rel=\"noopener noreferrer\">Log &amp; Event Manager<\/a>\u00a0(LEM) and Threat Monitor solutions\u2014designed for on-premises and cloud infrastructures, respectively\u2014support IT teams and MSPs in reducing the complexity of monitoring, detecting, and responding to threats.<\/p>\n<p>No matter what tool you select, it must possess four core capabilities in order to be effective: It should detect threats, log data analysis to understand the threat, respond to threats, and assist organizations in demonstrating regulatory compliance. When choosing a SolarWinds solution, rest assured that both LEM and Threat Monitor are designed to execute far beyond these core functions within an intuitive, easy-to-use interface and actionable insights.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Interested in learning more about SIEM solutions? Explore our\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\" target=\"_blank\" rel=\"noopener\">product suite<\/a>\u00a0to see how you can improve SIEM security and monitoring.<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Learn about uses for open source siem solutions, ossim system requirements, and other important considerations for siem management.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5517","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SIEM Open Source Overview - N-able<\/title>\n<meta name=\"description\" content=\"Learn about uses for open source siem solutions, ossim system requirements, and other important considerations for siem management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SIEM Open Source Overview - N-able\" \/>\n<meta property=\"og:description\" content=\"Learn about uses for open source siem solutions, ossim system requirements, and other important considerations for siem management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-21T19:46:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-09T15:01:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/SIEM%20Body.jpg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"SIEM Open Source Overview\",\"datePublished\":\"2019-02-21T19:46:15+00:00\",\"dateModified\":\"2021-07-09T15:01:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview\"},\"wordCount\":1110,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/SIEM%20Body.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview\",\"name\":\"SIEM Open Source Overview - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/SIEM%20Body.jpg\",\"datePublished\":\"2019-02-21T19:46:15+00:00\",\"dateModified\":\"2021-07-09T15:01:22+00:00\",\"description\":\"Learn about uses for open source siem solutions, ossim system requirements, and other important considerations for siem management.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/SIEM%20Body.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/SIEM%20Body.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SIEM Open Source Overview\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SIEM Open Source Overview - N-able","description":"Learn about uses for open source siem solutions, ossim system requirements, and other important considerations for siem management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview","og_locale":"fr_FR","og_type":"article","og_title":"SIEM Open Source Overview - N-able","og_description":"Learn about uses for open source siem solutions, ossim system requirements, and other important considerations for siem management.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-02-21T19:46:15+00:00","article_modified_time":"2021-07-09T15:01:22+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/SIEM%20Body.jpg","type":"","width":"","height":""}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"N-able","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"SIEM Open Source Overview","datePublished":"2019-02-21T19:46:15+00:00","dateModified":"2021-07-09T15:01:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview"},"wordCount":1110,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"image":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/SIEM%20Body.jpg","articleSection":["Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview","url":"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview","name":"SIEM Open Source Overview - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/SIEM%20Body.jpg","datePublished":"2019-02-21T19:46:15+00:00","dateModified":"2021-07-09T15:01:22+00:00","description":"Learn about uses for open source siem solutions, ossim system requirements, and other important considerations for siem management.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/SIEM%20Body.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/SIEM%20Body.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/ossim-open-source-siem-overview#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"SIEM Open Source Overview"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/5517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=5517"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/5517\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=5517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}