{"id":3159,"date":"2024-06-28T11:15:45","date_gmt":"2024-06-28T10:15:45","guid":{"rendered":"https:\/\/cwsisecurity.com\/?p=3159"},"modified":"2025-12-02T13:53:17","modified_gmt":"2025-12-02T13:53:17","slug":"what-is-a-managed-siem","status":"publish","type":"post","link":"https:\/\/cwsisecurity.com\/fr\/what-is-a-managed-siem\/","title":{"rendered":"Demystifying a Managed SIEM: What Is It and How Does It Reinforce Cyber Resilience?"},"content":{"rendered":"\n<p><em>Navigating the complexities of today&rsquo;s digital landscape requires robust cybersecurity measures. At the forefront of these defence strategies is a Managed Security Information and Event Management <\/em><a href=\"https:\/\/cwsisecurity.com\/what-is-the-difference-between-a-siem-and-a-soc\/\"><strong><em>(SIEM) system<\/em><\/strong><\/a><em>. To get you up to speed on how this tool empowers your organisation to enhance its resilience against evolving cyber <\/em><a href=\"https:\/\/cwsisecurity.com\/five-key-threat-actor-groups\/\"><strong><em>threats<\/em><\/strong><\/a><em>, this blog explores the critical role a SIEM plays in enhancing threat detection and streamlining incident response.<\/em><\/p>\n\n\n\n<p>In today&rsquo;s rapidly evolving digital landscape, cybersecurity remains paramount for businesses of all sizes. As cyber <a href=\"https:\/\/cwsisecurity.com\/six-cyber-threats-to-watch\/\">threats<\/a> become increasingly sophisticated and pervasive, organisations face a growing need for robust security measures to <a href=\"https:\/\/cwsisecurity.com\/threat-protection-engagement\/\">protect<\/a> their sensitive data and maintain operational continuity. One critical defence mechanism is a <a href=\"https:\/\/cwsisecurity.com\/defend-against-threats-with-siem-plus-xdr-workshop\/\">Managed Security Information and Event Management (SIEM)<\/a> solution.<\/p>\n\n\n\n<p>In blog, we\u2019ll delve into the pivotal role of a Managed SIEM in today&rsquo;s threat landscape. We&rsquo;ll explore how it enhances <a href=\"https:\/\/cwsisecurity.com\/abcs-of-threat-hunting\/\">threat detection<\/a> capabilities, strengthens incident response processes, and aligns with compliance requirements.<\/p>\n\n\n\n<div style=\"height:37px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What is a Managed SIEM?<\/h2>\n\n\n\n<div style=\"height:17px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Unlike traditional SIEM solutions that demand substantial internal resources and expertise, a Managed SIEM is outsourced to third-party providers who handle the deployment, configuration, and ongoing management of the SIEM platform, allowing organisations to benefit from expert security monitoring without the operational overhead.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Managed SIEM <a href=\"https:\/\/cwsisecurity.com\/services\/our-managed-services\/\">services<\/a> empower organisations by enabling proactive monitoring and real-time response to security incidents. By aggregating and analysing extensive data from various sources across the IT infrastructure, a Managed SIEM provides deep visibility into potential threats and anomalies. This proactive approach allows organisations to swiftly detect and mitigate <a href=\"https:\/\/cwsisecurity.com\/how-can-businesses-protect-against-99-of-cyber-attacks\/\">cyber-attacks<\/a>, thereby reducing the risk of data breaches, financial losses, and reputational damage.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2024\/01\/Website-landscape-images.png\" alt=\"\" class=\"wp-image-2473\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:37px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What Does a SIEM Do?<\/h2>\n\n\n\n<div style=\"height:17px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>A SIEM serves as a centralised platform that aggregates log data from various sources across an organisation&rsquo;s IT infrastructure, including endpoints, network appliances, and virtual or physical collectors. The platform then categorises this log <a href=\"https:\/\/cwsisecurity.com\/data-security-engagement\/\">data into security events<\/a> such as malware incidents, failed login attempts, and suspicious activities. When potential threats are detected based on predefined rules, the SIEM generates alerts with corresponding threat levels.<\/p>\n\n\n\n<p>Manual monitoring of such vast data volumes would be impractical, making the SIEM essential for automating the detection of suspicious activities. It flags suspicious events for further investigation by security analysts, facilitating faster threat detection and response.<\/p>\n\n\n\n<div style=\"height:37px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Benefits of Using a Managed SIEM<\/h2>\n\n\n\n<div style=\"height:17px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Managed SIEM services offer organisations significant benefits beyond traditional SIEM deployments. By outsourcing the deployment, configuration, and ongoing management to experienced third-parties, businesses can leverage expert knowledge and resources without the burden of internal maintenance.<\/p>\n\n\n\n<p>Besides, a Managed SIEM enhances threat detection accuracy through continuous monitoring and proactive threat hunting, reducing false positives and ensuring timely incident response. This approach also provides organisations with comprehensive visual dashboards that offer enhanced visibility into their cybersecurity posture, facilitating better decision-making and mitigation of emerging threats.<\/p>\n\n\n\n<div style=\"height:37px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Managed SIEM vs. Managed Security Service<\/h2>\n\n\n\n<div style=\"height:17px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><a href=\"https:\/\/cwsisecurity.com\/our-services-old\/mdr-endpoints\/\">Managed Detection and Response (MDR)<\/a> services enhance traditional Security Information and Event Management (SIEM) systems by integrating advanced threat detection technologies with expert human response capabilities. While a SIEM focuses on aggregating and analysing security event data for threat detection and compliance, MDR goes further with continuous monitoring, proactive threat hunting, incident response, and remediation services.<\/p>\n\n\n\n<p>Both solutions are critical for organisations seeking to strengthen their cybersecurity posture, providing robust defence against evolving threats while simplifying the operational challenges associated with SIEM deployments.<\/p>\n\n\n\n<p>When combined within a Managed Security Services framework, Managed SIEM services offer seamless integration with 24&#215;7 monitoring through automation. This proactive approach facilitates rapid identification, investigation, and response to potential security incidents, supported by skilled security analysts who ensure prompt threat mitigation and adherence to compliance standards.<\/p>\n\n\n\n<div style=\"height:37px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">How CWSI Can Help<\/mark><\/h2>\n\n\n\n<div style=\"height:17px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>At CWSI, we recognise the paramount importance of robust cybersecurity in today&rsquo;s digital landscape. Our <a href=\"https:\/\/cwsisecurity.com\/services\/our-managed-services\/\">Managed Security Services<\/a> are tailored to empower your organisation with cutting-edge threat detection, real-time monitoring, and expert incident response capabilities.<\/p>\n\n\n\n<p>By partnering with CWSI, your business can adopt proactive security measures while maintaining focus on core operations. <a href=\"https:\/\/cwsisecurity.com\/contact-us\/\">Contact us<\/a> today to discover how we can bolster your cybersecurity posture and safeguard your organisation against evolving threats.<\/p>\n\n\n\n<div style=\"height:28px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<iframe loading=\"lazy\" src=\"https:\/\/cwsiinsights.cwsi.ie\/l\/1024581\/2024-06-28\/gr8t4\" width=\"100%\" height=\"650\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\" style=\"border: 0\"><\/iframe>\n","protected":false},"excerpt":{"rendered":"<p>Navigating the complexities of today&rsquo;s digital landscape requires robust cybersecurity measures. At the forefront of these defence strategies is a Managed Security Information and Event Management (SIEM) system. To get you up to speed on how this tool empowers your organisation to enhance its resilience against evolving cyber threats, this blog explores the critical role [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2299,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[93,4],"tags":[],"class_list":["post-3159","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","category-our-voice"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is a Managed SIEM | Blog | CWSI<\/title>\n<meta name=\"description\" content=\"Explore the depths of managed SIEM in this detailed guide from CWSI Security. We discuss what SIEM\u2019s are, the benefits of using them and much more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwsisecurity.com\/fr\/what-is-a-managed-siem\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Demystifying a Managed SIEM: What Is It and How Does It Reinforce Cyber Resilience?\" \/>\n<meta property=\"og:description\" content=\"Security made human. Compliance made simple. Protect your business without slowing it down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwsisecurity.com\/fr\/what-is-a-managed-siem\/\" \/>\n<meta property=\"og:site_name\" content=\"CWSI\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-28T10:15:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-02T13:53:17+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"fluroltd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/what-is-a-managed-siem\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/what-is-a-managed-siem\\\/\"},\"headline\":\"Demystifying a Managed SIEM: What Is It and How Does It Reinforce Cyber Resilience?\",\"datePublished\":\"2024-06-28T10:15:45+00:00\",\"dateModified\":\"2025-12-02T13:53:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/what-is-a-managed-siem\\\/\"},\"wordCount\":691,\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/what-is-a-managed-siem\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Insights\",\"Our Voice\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/what-is-a-managed-siem\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/what-is-a-managed-siem\\\/\",\"name\":\"What is a Managed SIEM | Blog | CWSI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/what-is-a-managed-siem\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/what-is-a-managed-siem\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2024-06-28T10:15:45+00:00\",\"dateModified\":\"2025-12-02T13:53:17+00:00\",\"description\":\"Explore the depths of managed SIEM in this detailed guide from CWSI Security. We discuss what SIEM\u2019s are, the benefits of using them and much more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/what-is-a-managed-siem\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/what-is-a-managed-siem\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/what-is-a-managed-siem\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/what-is-a-managed-siem\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Demystifying a Managed SIEM: What Is It and How Does It Reinforce Cyber Resilience?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/\",\"name\":\"CWSI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/#organization\",\"name\":\"CWSI\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"width\":125,\"height\":30,\"caption\":\"CWSI\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cwsi\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@cwsimobileandcloudsecurity361\"],\"description\":\"Security made human. Compliance made simple. Protect your business without slowing it down.\",\"email\":\"info.uk@cwsisecurity.com\",\"telephone\":\"+44 1189 344 300\",\"legalName\":\"CWSI Security\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/fr\\\/#\\\/schema\\\/person\\\/870becf0b1e6869361f9510f90f8ce2a\",\"name\":\"fluroltd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"caption\":\"fluroltd\"},\"sameAs\":[\"https:\\\/\\\/cwsisecurity.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is a Managed SIEM | Blog | CWSI","description":"Explore the depths of managed SIEM in this detailed guide from CWSI Security. We discuss what SIEM\u2019s are, the benefits of using them and much more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwsisecurity.com\/fr\/what-is-a-managed-siem\/","og_locale":"fr_FR","og_type":"article","og_title":"Demystifying a Managed SIEM: What Is It and How Does It Reinforce Cyber Resilience?","og_description":"Security made human. Compliance made simple. Protect your business without slowing it down.","og_url":"https:\/\/cwsisecurity.com\/fr\/what-is-a-managed-siem\/","og_site_name":"CWSI","article_published_time":"2024-06-28T10:15:45+00:00","article_modified_time":"2025-12-02T13:53:17+00:00","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"fluroltd","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwsisecurity.com\/fr\/what-is-a-managed-siem\/#article","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/fr\/what-is-a-managed-siem\/"},"headline":"Demystifying a Managed SIEM: What Is It and How Does It Reinforce Cyber Resilience?","datePublished":"2024-06-28T10:15:45+00:00","dateModified":"2025-12-02T13:53:17+00:00","mainEntityOfPage":{"@id":"https:\/\/cwsisecurity.com\/fr\/what-is-a-managed-siem\/"},"wordCount":691,"publisher":{"@id":"https:\/\/cwsisecurity.com\/fr\/#organization"},"image":{"@id":"https:\/\/cwsisecurity.com\/fr\/what-is-a-managed-siem\/#primaryimage"},"thumbnailUrl":"","articleSection":["Insights","Our Voice"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/cwsisecurity.com\/fr\/what-is-a-managed-siem\/","url":"https:\/\/cwsisecurity.com\/fr\/what-is-a-managed-siem\/","name":"What is a Managed SIEM | Blog | CWSI","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwsisecurity.com\/fr\/what-is-a-managed-siem\/#primaryimage"},"image":{"@id":"https:\/\/cwsisecurity.com\/fr\/what-is-a-managed-siem\/#primaryimage"},"thumbnailUrl":"","datePublished":"2024-06-28T10:15:45+00:00","dateModified":"2025-12-02T13:53:17+00:00","description":"Explore the depths of managed SIEM in this detailed guide from CWSI Security. We discuss what SIEM\u2019s are, the benefits of using them and much more.","breadcrumb":{"@id":"https:\/\/cwsisecurity.com\/fr\/what-is-a-managed-siem\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwsisecurity.com\/fr\/what-is-a-managed-siem\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/cwsisecurity.com\/fr\/what-is-a-managed-siem\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/cwsisecurity.com\/fr\/what-is-a-managed-siem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/cwsisecurity.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Demystifying a Managed SIEM: What Is It and How Does It Reinforce Cyber Resilience?"}]},{"@type":"WebSite","@id":"https:\/\/cwsisecurity.com\/fr\/#website","url":"https:\/\/cwsisecurity.com\/fr\/","name":"CWSI","description":"","publisher":{"@id":"https:\/\/cwsisecurity.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwsisecurity.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/cwsisecurity.com\/fr\/#organization","name":"CWSI","url":"https:\/\/cwsisecurity.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/cwsisecurity.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","width":125,"height":30,"caption":"CWSI"},"image":{"@id":"https:\/\/cwsisecurity.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cwsi\/","https:\/\/www.youtube.com\/@cwsimobileandcloudsecurity361"],"description":"Security made human. Compliance made simple. Protect your business without slowing it down.","email":"info.uk@cwsisecurity.com","telephone":"+44 1189 344 300","legalName":"CWSI Security","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/cwsisecurity.com\/fr\/#\/schema\/person\/870becf0b1e6869361f9510f90f8ce2a","name":"fluroltd","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","caption":"fluroltd"},"sameAs":["https:\/\/cwsisecurity.com"]}]}},"_links":{"self":[{"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/posts\/3159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/comments?post=3159"}],"version-history":[{"count":0,"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/posts\/3159\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/media?parent=3159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/categories?post=3159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwsisecurity.com\/fr\/wp-json\/wp\/v2\/tags?post=3159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}