{"id":20986,"date":"2024-11-20T08:31:30","date_gmt":"2024-11-20T07:31:30","guid":{"rendered":"https:\/\/sertalink.com\/?page_id=20986"},"modified":"2024-11-20T09:13:41","modified_gmt":"2024-11-20T08:13:41","slug":"stellar-endpoint-protection","status":"publish","type":"page","link":"https:\/\/sertalink.com\/fr\/stellar-endpoint-protection\/","title":{"rendered":"Stellar Endpoint Protection"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/media.txone.com\/prod\/uploads\/2023\/05\/full-width-hero-Automotive-2000&#215;1125-1.jpg&#8221; hover_enabled=&#8221;0&#8243; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<header class=\"hero__head has-bar\">\n<header class=\"hero__head has-bar\">\n<h1><span style=\"color: #ffffff;\">Endpoint Protection<\/span><\/h1>\n<p><span style=\"color: #ffffff;\">Protect ICS assets working in highly variable conditions with TXOne\u2019s OT zero trust-based all-terrain endpoint security solutions.<\/span><\/p>\n<\/header>\n<\/header>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.txone.com\/contact\/&#8221; button_text=&#8221;Speak to an expert&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_layout=&#8221;dark&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/media.txone.com\/prod\/uploads\/2024\/04\/Asset-Security-Lifecycle-Endpoint-Protection-v4.png&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h3>Secure variant conditions in the ICS environment by deploying TXOne industrial-grade ICS endpoint protection<\/h3>\n<p>The second stage of the assets lifecycle is \u201cOn Staging\u201d, this stage is to ensure a proper workload configuration and based on assets working conditions to install well fit endpoint security software for legacy and modern operating systems.<\/p>\n<p>Modern work sites usually need to accommodate legacy endpoints in their operational environment, which must interconnect and work well with their many different assets. Traditional antivirus is not designed for the ICS environment \u2013 constant virus signature updates require an internet connection while intrusive file scans require a lot of processing power and can easily interfere with operations. Endpoint Protection in the operational environment requires a different spectrum of consideration. There, security must never jeopardize routine operation, slow down computation, or delay decisions made in the factory production process. TXOne Networks offers adaptive, all-terrain ICS cybersecurity solutions in the form of different endpoint suites that secure both legacy systems and modern devices in a variety of worksite environments, customized with input from leading specialists in each vertical.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; theme_builder_area=&#8221;post_content&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221; da_disable_devices=&#8221;off|off|off&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;4_4&#8243; theme_builder_area=&#8221;post_content&#8221;][et_pb_video src=&#8221;https:\/\/youtu.be\/Gge4Qtxv3Ac&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_video][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; background_color=&#8221;#f2f2f2&#8243; sticky_enabled=&#8221;0&#8243; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h3>Find out why critical infrastructure organizations choose Stellar<\/h3>\n<ul>\n<li aria-level=\"1\">Minimize performance impact<\/li>\n<li aria-level=\"1\">Secure operations while maintaining high resource availability<\/li>\n<li aria-level=\"1\">Provide effective cyber defense to assets with no internet connection\u00a0and no access to pattern updates<\/li>\n<li aria-level=\"1\">Defend against both known and unknown\u00a0attacks<\/li>\n<li aria-level=\"1\">Support for legacy and modern Windows operating systems with a central management console<\/li>\n<li aria-level=\"1\">Manage legacy and modern endpoints side-by-side from a single pane of glass<\/li>\n<\/ul>\n<div class=\"button-box\"><a href=\"https:\/\/www.txone.com\/products\/endpoint-protection\/stellar\/\" class=\"button button--chevron internal\">View product<\/a><\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/media.txone.com\/prod\/uploads\/2023\/05\/TXOne-Stellar-package-727&#215;990-1.png&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; background_color=&#8221;#0d051b&#8221; sticky_enabled=&#8221;0&#8243; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; background_color=&#8221;#d71920&#8243; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<ul>\n<li>\n<h4><span style=\"color: #ffffff;\"><img decoding=\"async\" src=\"https:\/\/www.txone.com\/app\/themes\/TXOne\/assets\/images\/logo-small-white.svg\" alt=\"TXOne Networks\" \/><\/span><\/h4>\n<h3><span style=\"color: #ffffff;\">Ready to deploy your OT cybersecurity?<\/span><\/h3>\n<p><span style=\"color: #ffffff;\">Get in touch with our experts to arrange for a live personalized demo, get answers to your questions, and find out why TXOne Networks is the right choice to secure your operational technology.<\/span><\/p>\n<div class=\"button-box\"><span style=\"color: #ffffff;\"><a href=\"https:\/\/www.txone.com\/contact\/\" class=\"button button--alt button--chevron internal\" style=\"color: #ffffff;\">Nous contacter<\/a><\/span><\/div>\n<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/media.txone.com\/prod\/uploads\/2022\/04\/iStock-1276736601-2.jpg&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1 style=\"text-align: center;\">Latest Resources<\/h1>\n<div class=\"posts__grid\">\n<div class=\"posts__post-thumbnail\"><\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"posts__post-thumbnail\">\n<p><img loading=\"lazy\" width=\"400\" height=\"566\" src=\"https:\/\/media.txone.com\/prod\/uploads\/2024\/11\/thumbnail-Building-Cybersecurity-Immunity-in-Pharma-TXOne-WP.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"Building Cybersecurity Immunity in Pharma: A Strategy for CISOs-TXOne WP\" decoding=\"async\" srcset=\"https:\/\/media.txone.com\/prod\/uploads\/2024\/11\/thumbnail-Building-Cybersecurity-Immunity-in-Pharma-TXOne-WP.jpg 400w, https:\/\/media.txone.com\/prod\/uploads\/2024\/11\/thumbnail-Building-Cybersecurity-Immunity-in-Pharma-TXOne-WP-212x300.jpg 212w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/p>\n<p class=\"category\">White Papers<\/p>\n<\/div>\n<div class=\"posts__post-content\">\n<div class=\"posts__post-details\">\n<p>Nov 12, 2024<\/p>\n<h3>Building Cybersecurity Immunity in Pharma: A Strategy for CISOs<\/h3>\n<\/div>\n<div class=\"posts__post-tags\">\n<p>compliance<\/p>\n<p>pharmaceutical industry<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"posts__post-thumbnail\">\n<p><img loading=\"lazy\" width=\"1024\" height=\"598\" src=\"https:\/\/media.txone.com\/prod\/uploads\/2024\/11\/Blog-VPN-Gremlin-part-2-1024x598-1.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"VPN Gremlin: User Impersonation Attack in Multiple SSL VPNs \u2013 Part 2\" decoding=\"async\" srcset=\"https:\/\/media.txone.com\/prod\/uploads\/2024\/11\/Blog-VPN-Gremlin-part-2-1024x598-1.jpg 1024w, https:\/\/media.txone.com\/prod\/uploads\/2024\/11\/Blog-VPN-Gremlin-part-2-1024x598-1-300x175.jpg 300w, https:\/\/media.txone.com\/prod\/uploads\/2024\/11\/Blog-VPN-Gremlin-part-2-1024x598-1-768x449.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p class=\"category\">Blog<\/p>\n<\/div>\n<div class=\"posts__post-content\">\n<div class=\"posts__post-details\">\n<p>Nov 08, 2024<\/p>\n<h3>VPN Gremlin: User Impersonation Attack in Multiple SSL VPNs \u2013 Part 2<\/h3>\n<\/div>\n<div class=\"posts__post-tags\">\n<p>new vulnerabilities<\/p>\n<p>Vulnerabilities and exploits<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"posts__post-thumbnail\">\n<p><img loading=\"lazy\" width=\"1024\" height=\"578\" src=\"https:\/\/media.txone.com\/prod\/uploads\/2024\/10\/thumbnail-Why-August-Storck-KG-chose-TXOne-Networks-for-their-Security-Solutions.png\" class=\"attachment-large size-large wp-post-image\" alt=\"Customer Story: Why August Storck KG chose TXOne Networks for their Security Solutions\" decoding=\"async\" srcset=\"https:\/\/media.txone.com\/prod\/uploads\/2024\/10\/thumbnail-Why-August-Storck-KG-chose-TXOne-Networks-for-their-Security-Solutions.png 1024w, https:\/\/media.txone.com\/prod\/uploads\/2024\/10\/thumbnail-Why-August-Storck-KG-chose-TXOne-Networks-for-their-Security-Solutions-300x169.png 300w, https:\/\/media.txone.com\/prod\/uploads\/2024\/10\/thumbnail-Why-August-Storck-KG-chose-TXOne-Networks-for-their-Security-Solutions-768x434.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p class=\"category\">Customer Stories<\/p>\n<\/div>\n<div class=\"posts__post-content\">\n<div class=\"posts__post-details\">\n<p>Oct 30, 2024<\/p>\n<h3>Stable OT Security: Why August Storck KG chose TXOne Networks for their Security Solutions<\/h3>\n<\/div>\n<div class=\"posts__post-tags\">\n<p>customer story<\/p>\n<p>Cyber-Physical Systems Detection and Response(CPSDR)<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>Endpoint Protection Protect ICS assets working in highly variable conditions with TXOne\u2019s OT zero trust-based all-terrain endpoint security solutions. Secure variant conditions in the ICS environment by deploying TXOne industrial-grade ICS endpoint protection The second stage of the assets lifecycle is \u201cOn Staging\u201d, this stage is to ensure a proper workload configuration and based on [&hellip;]<\/p>","protected":false},"author":29,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-20986","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.1.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Stellar Endpoint Protection | Sertalink Belgium &amp; Luxembourg<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sertalink.com\/fr\/stellar-endpoint-protection\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stellar Endpoint Protection | Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sertalink.com\/fr\/stellar-endpoint-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sertalink\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-20T08:13:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.txone.com\/app\/themes\/TXOne\/assets\/images\/logo-small-white.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sertalink_bnlx\" \/>\n<meta name=\"twitter:site\" content=\"@sertalink_bnlx\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/sertalink.com\/fr\/#organization\",\"name\":\"Sertalink Belgium\",\"url\":\"https:\/\/sertalink.com\/fr\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/sertalink\/\",\"https:\/\/www.linkedin.com\/company\/sertalink\/\",\"https:\/\/twitter.com\/sertalink_bnlx\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/sertalink.com\/fr\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/sertalink.com\/wp-content\/uploads\/2016\/09\/sertaLinkLogo.png\",\"width\":90,\"height\":112,\"caption\":\"Sertalink Belgium\"},\"image\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#logo\"},\"location\":{\"@id\":\"https:\/\/sertalink.com\/stellar-endpoint-protection\/#local-place\"},\"address\":{\"@id\":\"https:\/\/sertalink.com\/stellar-endpoint-protection\/#local-place-address\"},\"email\":\"sales@sertalink.com\",\"telephone\":\"+3293109351\",\"areaServed\":\"Benelux\",\"vatID\":\"BE 0632.806.125\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sertalink.com\/fr\/#website\",\"url\":\"https:\/\/sertalink.com\/fr\/\",\"name\":\"Sertalink Belgium &amp; Luxembourg\",\"description\":\"Your link to a safe environment\",\"publisher\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/sertalink.com\/fr\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/sertalink.com\/stellar-endpoint-protection\/#primaryimage\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/www.txone.com\/app\/themes\/TXOne\/assets\/images\/logo-small-white.svg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sertalink.com\/stellar-endpoint-protection\/#webpage\",\"url\":\"https:\/\/sertalink.com\/stellar-endpoint-protection\/\",\"name\":\"Stellar Endpoint Protection | Sertalink Belgium &amp; Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sertalink.com\/stellar-endpoint-protection\/#primaryimage\"},\"datePublished\":\"2024-11-20T07:31:30+00:00\",\"dateModified\":\"2024-11-20T08:13:41+00:00\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sertalink.com\/stellar-endpoint-protection\/\"]}]},{\"@type\":\"Place\",\"@id\":\"https:\/\/sertalink.com\/stellar-endpoint-protection\/#local-place\",\"address\":{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/sertalink.com\/stellar-endpoint-protection\/#local-place-address\",\"streetAddress\":\"Gentse Steenweg 47\",\"addressLocality\":\"Lokeren\",\"postalCode\":\"9160\",\"addressRegion\":\"Oost-Vlaanderen\",\"addressCountry\":\"BE\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"\",\"longitude\":\"\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"telephone\":\"+3293109351\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Lokeren\" \/>\n<meta name=\"geo.region\" content=\"Belgique\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/20986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/comments?post=20986"}],"version-history":[{"count":3,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/20986\/revisions"}],"predecessor-version":[{"id":20990,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/20986\/revisions\/20990"}],"wp:attachment":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/media?parent=20986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}