{"version":"1.0","provider_name":"Canons \u00e0 brouillard PROTECT\u2122","provider_url":"https:\/\/protectglobal.com\/fr\/","title":"Pourquoi utiliser le brouillard de s\u00e9curit\u00e9 ?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"IFSWtc8GLg\"><a href=\"https:\/\/protectglobal.com\/fr\/pourquoi-utiliser-le-brouillard-de-securite\/\">Pourquoi utiliser le brouillard de s\u00e9curit\u00e9 ?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/protectglobal.com\/fr\/pourquoi-utiliser-le-brouillard-de-securite\/embed\/#?secret=IFSWtc8GLg\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Pourquoi utiliser le brouillard de s\u00e9curit\u00e9 ?\u00a0\u00bb &#8212; Canons \u00e0 brouillard PROTECT\u2122\" data-secret=\"IFSWtc8GLg\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/protectglobal.com\/wp-content\/uploads\/2024\/03\/protect-800i-c-m.-taage-scaled.jpg","thumbnail_width":2560,"thumbnail_height":1230,"description":"Dans le paysage s\u00e9curitaire actuel, en constante \u00e9volution, les entreprises et les individus sont confront\u00e9s \u00e0 de nombreuses menaces pour leur s\u00e9curit\u00e9 et leurs biens. Les mesures de s\u00e9curit\u00e9 traditionnelles, telles que les alarmes et les syst\u00e8mes de surveillance, offrent un certain niveau de protection, mais elles ne dissuadent pas toujours les intrus d\u00e9termin\u00e9s. C\u2019est [&hellip;]"}