{"version":"1.0","provider_name":"STID","provider_url":"https:\/\/stid-security.com\/fr\/","author_name":"Camille Gladieux","author_url":"https:\/\/stid-security.com\/fr\/author\/camille\/","title":"R\u00e9alisez une migration technologique en toute fluidit\u00e9 - STID","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"9mmumnWpOo\"><a href=\"https:\/\/stid-security.com\/fr\/challenges\/realisez-une-migration-technologique-en-toute-fluidite\/\">R\u00e9alisez une migration technologique en toute fluidit\u00e9<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/stid-security.com\/fr\/challenges\/realisez-une-migration-technologique-en-toute-fluidite\/embed\/#?secret=9mmumnWpOo\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0R\u00e9alisez une migration technologique en toute fluidit\u00e9\u00a0\u00bb &#8212; STID\" data-secret=\"9mmumnWpOo\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/stid-security.com\/app\/uploads\/2025\/06\/technical-migration.png","thumbnail_width":630,"thumbnail_height":515,"description":"\u00c9voluez sans contraintes Et si les d\u00e9fis li\u00e9s \u00e0 la migration technologique devenaient une opportunit\u00e9 ?Avec 70 % des syst\u00e8mes de contr\u00f4le d\u2019acc\u00e8s obsol\u00e8tes et vuln\u00e9rables, la modernisation est essentielle pour prot\u00e9ger les personnes et les actifs face aux menaces physiques et cyber. Cependant, faire \u00e9voluer un syst\u00e8me existant tout en assurant la continuit\u00e9 de &hellip; Continued"}