{"id":267277,"date":"2026-04-12T15:50:48","date_gmt":"2026-04-12T14:50:48","guid":{"rendered":"https:\/\/motekx.be\/cybersecurite\/"},"modified":"2026-04-20T08:34:46","modified_gmt":"2026-04-20T07:34:46","slug":"cybersecurite","status":"publish","type":"page","link":"https:\/\/motekx.be\/fr\/services\/cybersecurite\/","title":{"rendered":"Cybers\u00e9curit\u00e9"},"content":{"rendered":"<div class=\"et_pb_section_0 et_pb_section et_section_regular et_flex_section\"><span class=\"et_pb_background_mask\"><\/span>\n<div class=\"et_pb_row_0 et_pb_row et_grid_row\">\n<div class=\"et_pb_column_0 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough\">\n<section class=\"et_pb_fullwidth_header_0 et_pb_fullwidth_header et_pb_bg_layout_dark et_pb_text_align_left et_pb_module et_flex_module preset--module--divi-fullwidth-header--default\"><div class=\"et_pb_fullwidth_header_container left\"><div class=\"header-content-container center\"><div class=\"header-content et_flex_module\"><h1 class=\"et_pb_module_header\">Cybers\u00e9curit\u00e9<\/h1><span class=\"et_pb_fullwidth_header_subhead\">Protection continue pour vos syst\u00e8mes d\u2019entreprise<\/span><div class=\"et_pb_header_content_wrapper\"><div>\n<p>Les cybermenaces ne ciblent pas uniquement les grandes entreprises. Les petites entreprises sont de plus en plus expos\u00e9es aux logiciels malveillants, au hame\u00e7onnage, au spam et \u00e0 l\u2019usurpation de r\u00e9putation \u2014 souvent sans l\u2019expertise interne n\u00e9cessaire pour d\u00e9tecter les risques pr\u00e9cocement. <\/p>\n<ul><\/ul>\n<p>Avec <strong>Cybersecurity<\/strong>, Motekx assure une surveillance continue et des contr\u00f4les de protection pour r\u00e9duire l\u2019exposition, d\u00e9tecter les menaces et aider \u00e0 maintenir la s\u00e9curit\u00e9 de vos syst\u00e8mes.<\/p>\n<\/div>\n<\/div><div class=\"et_pb_header_button_wrapper\"><\/div><\/div><\/div><\/div><div class=\"et_pb_fullwidth_header_overlay\"><\/div><div class=\"et_pb_fullwidth_header_scroll\"><\/div><\/section>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_section_1 et_pb_section et_section_regular et_flex_section\">\n<div class=\"et_pb_row_1 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_1 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone et_flex_column_24_24_phoneWide et_flex_column_24_24_tabletWide et_flex_column_24_24_widescreen et_flex_column_24_24_ultraWide\">\n<div class=\"et_pb_heading_0 et_pb_heading et_pb_module et_flex_module preset--module--divi-heading--default\"><div class=\"et_pb_heading_container\"><h2 class=\"et_pb_module_header\">Quel probl\u00e8me cela r\u00e9sout<\/h2><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_2 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_2 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone et_flex_column_24_24_phoneWide et_flex_column_24_24_tabletWide et_flex_column_24_24_widescreen et_flex_column_24_24_ultraWide\">\n<div class=\"et_pb_text_0 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><div>\n<p>De nombreuses petites entreprises sont confront\u00e9es \u00e0 :<\/p>\n<ul>\n<li>Des tentatives de logiciels malveillants et de hame\u00e7onnage ciblant les e-mails et les sites web<\/li>\n<li>Des dommages r\u00e9putationnels dus \u00e0 des domaines ou des adresses IP compromis<\/li>\n<li>Des failles de s\u00e9curit\u00e9 d\u00e9couvertes seulement apr\u00e8s que les dommages ont \u00e9t\u00e9 caus\u00e9s<\/li>\n<li>Une absence de visibilit\u00e9 claire sur leur posture de s\u00e9curit\u00e9 r\u00e9elle<\/li>\n<\/ul>\n<p>Cybersecurity remplace la protection au cas par cas par un <strong>socle de s\u00e9curit\u00e9 g\u00e9r\u00e9 et proactif<\/strong>, adapt\u00e9 aux PME.<\/p>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_3 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_3 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone et_flex_column_24_24_phoneWide et_flex_column_24_24_tabletWide et_flex_column_24_24_widescreen et_flex_column_24_24_ultraWide\">\n<div class=\"et_pb_divider_0 et_pb_divider et_pb_space et_pb_divider_position_top et_pb_module\"><div class=\"et_pb_divider_internal\"><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_4 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_4 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone et_flex_column_24_24_phoneWide et_flex_column_24_24_tabletWide et_flex_column_24_24_widescreen et_flex_column_24_24_ultraWide\">\n<div class=\"et_pb_heading_1 et_pb_heading et_pb_module et_flex_module preset--module--divi-heading--default\"><div class=\"et_pb_heading_container\"><h2 class=\"et_pb_module_header\">Niveaux de service<\/h2><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_5 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_5 et_pb_column et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_3_5 et_flex_column_3_5_tablet et_flex_column_24_24_phone et_flex_column_24_24_phoneWide et_flex_column_3_5_tabletWide et_flex_column_3_5_widescreen et_flex_column_3_5_ultraWide\">\n<div class=\"et_pb_blurb_0 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_left et_pb_module et_flex_module preset--module--divi-blurb--default\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap\"><span class=\"et-pb-icon et_animated et_animated\">\uf00c<\/span><\/span><\/div><div class=\"et_pb_blurb_container\"><h3 class=\"et_pb_module_header\">Ce qui est inclus<\/h3><div class=\"et_pb_blurb_description\"><ul><\/ul>\n<div>\n<p>Cybersecurity est propos\u00e9 sous la forme d\u2019un <strong>plan structur\u00e9 unique<\/strong>, couvrant :<\/p>\n<ul>\n<li>Le renseignement sur les menaces en temps r\u00e9el<\/li>\n<li>La surveillance de la protection au niveau du pare-feu<\/li>\n<li>L\u2019analyse des vuln\u00e9rabilit\u00e9s<\/li>\n<li>La d\u00e9tection de logiciels malveillants et de spams<\/li>\n<li>La surveillance de la r\u00e9putation et des listes noires<\/li>\n<li>Des audits de s\u00e9curit\u00e9 p\u00e9riodiques<\/li>\n<\/ul>\n<p>Ce service se concentre sur la <strong>pr\u00e9vention, la d\u00e9tection et la visibilit\u00e9<\/strong>, et non sur la gestion d\u2019urgence apr\u00e8s coup.<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div>\n\n<div class=\"et_pb_blurb_1 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_left et_pb_module et_flex_module preset--module--divi-blurb--default\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap\"><span class=\"et-pb-icon et_animated et_animated\">\uf00d<\/span><\/span><\/div><div class=\"et_pb_blurb_container\"><h3 class=\"et_pb_module_header\">Ce qui n'est pas inclus<\/h3><div class=\"et_pb_blurb_description\"><ul><\/ul>\n<p>Le service Cybersecurity ne couvre pas :<\/p>\n<ul><\/ul>\n<div>\n<ul>\n<li>La r\u00e9ponse aux incidents ou l\u2019informatique l\u00e9gale (forensics)<\/li>\n<li>Les tests d\u2019intrusion<\/li>\n<li>La repr\u00e9sentation juridique ou r\u00e9glementaire<\/li>\n<li>Les garanties de s\u00e9curit\u00e9 ou les promesses de risque z\u00e9ro<\/li>\n<\/ul>\n<p>Les incidents graves ou les audits r\u00e9glementaires sont trait\u00e9s via des <strong>engagements personnalis\u00e9s<\/strong> ou des services avanc\u00e9s.<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_6 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_2_5 et_flex_column_2_5_tablet et_flex_column_24_24_phone et_flex_column_24_24_phoneWide et_flex_column_2_5_tabletWide et_flex_column_2_5_widescreen et_flex_column_2_5_ultraWide\">\n<div class=\"et_pb_blurb_2 et_pb_blurb et_pb_bg_layout_light et_pb_text_align_center et_pb_blurb_position_top et_pb_module et_flex_module preset--module--divi-blurb--default\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_blurb_container\"><h3 class=\"et_pb_module_header\">Pack Cybersecurity<\/h3><div class=\"et_pb_blurb_description\"><div>Tout ce dont vous avez besoin pour la protection de votre site web<\/div>\n<\/div><\/div>\n<div class=\"et_pb_text_1 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><p style=\"text-align: center;\"><strong>29,90 \u20ac<\/strong> \/mois + TVA<\/p>\n<\/div><\/div>\n\n<div class=\"et_pb_module et_pb_button_module_wrapper et_pb_button_0_wrapper\"><a class=\"et_pb_button_0 et_pb_button et_pb_bg_layout_light et_pb_module et_flex_module\" href=\"https:\/\/motekx.be\/subscriptions\/it\/cybersecurity-subscription\/\">Choisir la cybers\u00e9curit\u00e9<\/a><\/div>\n\n<div class=\"et_pb_text_2 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><div>\n<p>Cybersecurity fonctionne en continu en arri\u00e8re-plan :<\/p>\n<ul><\/ul>\n<ol>\n<li>Votre site web est surveill\u00e9 pour d\u00e9tecter les menaces connues et les anomalies<\/li>\n<li>Les vuln\u00e9rabilit\u00e9s et les risques sont identifi\u00e9s pr\u00e9cocement<\/li>\n<li>Les r\u00e9sultats sont examin\u00e9s et communiqu\u00e9s<\/li>\n<li>Des recommandations claires sont fournies lorsqu\u2019une action est requise<\/li>\n<\/ol>\n<blockquote>\n<p>Cette approche suit les pratiques de cybers\u00e9curit\u00e9 pour PME largement recommand\u00e9es dans l\u2019UE.<\/p>\n<\/blockquote>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_6 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_7 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone et_flex_column_24_24_phoneWide et_flex_column_24_24_tabletWide et_flex_column_24_24_widescreen et_flex_column_24_24_ultraWide\">\n<div class=\"et_pb_divider_1 et_pb_divider et_pb_space et_pb_divider_position_top et_pb_module\"><div class=\"et_pb_divider_internal\"><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_7 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_8 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone et_flex_column_24_24_phoneWide et_flex_column_24_24_tabletWide et_flex_column_24_24_widescreen et_flex_column_24_24_ultraWide\">\n<div class=\"et_pb_heading_2 et_pb_heading et_pb_module et_flex_module preset--module--divi-heading--default\"><div class=\"et_pb_heading_container\"><h2 class=\"et_pb_module_header\">Comment cela s'int\u00e8gre avec les autres services<\/h2><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_8 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_9 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone et_flex_column_24_24_phoneWide et_flex_column_24_24_tabletWide et_flex_column_24_24_widescreen et_flex_column_24_24_ultraWide\">\n<div class=\"et_pb_text_3 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><div>\n<p>Cybersecurity est souvent combin\u00e9 avec :<\/p>\n<ul>\n<li><strong>H\u00e9bergement g\u00e9r\u00e9 et domaine<\/strong><br \/>\nProt\u00e9ger l\u2019infrastructure et les services accessibles au public<\/li>\n<li><strong>Microsoft 365 g\u00e9r\u00e9<\/strong><br \/>\nR\u00e9duire les menaces li\u00e9es aux e-mails et les utilisations abusives<\/li>\n<li><strong>MOTEKX Care<\/strong><br \/>\nGarantir que les correctifs, les mises \u00e0 jour et la sant\u00e9 du syst\u00e8me soutiennent la s\u00e9curit\u00e9<\/li>\n<li><strong>Packs Cloud et informatique<\/strong><br \/>\nCentraliser l\u2019informatique, la s\u00e9curit\u00e9 et la maintenance sous un mod\u00e8le unique<\/li>\n<\/ul>\n<p>MOTEKX veille \u00e0 ce que les contr\u00f4les de s\u00e9curit\u00e9 restent align\u00e9s avec votre configuration informatique globale.<\/p>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_9 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_10 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone et_flex_column_24_24_phoneWide et_flex_column_24_24_tabletWide et_flex_column_24_24_widescreen et_flex_column_24_24_ultraWide\">\n<div class=\"et_pb_divider_2 et_pb_divider et_pb_space et_pb_divider_position_top et_pb_module\"><div class=\"et_pb_divider_internal\"><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_10 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_11 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone et_flex_column_24_24_phoneWide et_flex_column_24_24_tabletWide et_flex_column_24_24_widescreen et_flex_column_24_24_ultraWide\">\n<div class=\"et_pb_heading_3 et_pb_heading et_pb_module et_flex_module preset--module--divi-heading--default\"><div class=\"et_pb_heading_container\"><h2 class=\"et_pb_module_header\">Pourquoi MOTEKX<\/h2><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_11 et_pb_row et_pb_gutters3 et_block_row\">\n<div class=\"et_pb_column_12 et_pb_column et_pb_column_1_2 et_flex_column et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_blurb_3 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_left et_pb_module et_flex_module preset--module--divi-blurb--default\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap\"><span class=\"et-pb-icon et_animated et_animated\" title=\"Motekx_Cloud_Service\">\uf00c<\/span><\/span><\/div><div class=\"et_pb_blurb_container\"><h3 class=\"et_pb_module_header\">Approche<\/h3><div class=\"et_pb_blurb_description\"><p> Approche de cybers\u00e9curit\u00e9 ax\u00e9e sur les PME<\/p>\n<\/div><\/div><\/div><\/div>\n\n<div class=\"et_pb_blurb_4 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_left et_pb_module et_flex_module preset--module--divi-blurb--default\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap\"><span class=\"et-pb-icon et_animated et_animated\" title=\"Motekx_Cloud_Service\">\uf00c<\/span><\/span><\/div><div class=\"et_pb_blurb_container\"><h3 class=\"et_pb_module_header\">\u00c9cosyst\u00e8me<\/h3><div class=\"et_pb_blurb_description\"><p>Con\u00e7u pour compl\u00e9ter les services de conformit\u00e9 et de maintenance<\/p>\n<\/div><\/div><\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_13 et_pb_column et_pb_column_1_2 et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_blurb_5 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_left et_pb_module et_flex_module preset--module--divi-blurb--default\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap\"><span class=\"et-pb-icon et_animated et_animated\" title=\"Motekx_Cloud_Service\">\uf00c<\/span><\/span><\/div><div class=\"et_pb_blurb_container\"><h3 class=\"et_pb_module_header\">Simplicit\u00e9<\/h3><div class=\"et_pb_blurb_description\"><p>Pas de complexit\u00e9 inutile propre aux grandes entreprises<\/p>\n<\/div><\/div><\/div><\/div>\n\n<div class=\"et_pb_blurb_6 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_left et_pb_module et_flex_module preset--module--divi-blurb--default\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap\"><span class=\"et-pb-icon et_animated et_animated\" title=\"Motekx_Cloud_Service\">\uf00c<\/span><\/span><\/div><div class=\"et_pb_blurb_container\"><h3 class=\"et_pb_module_header\">Clart\u00e9<\/h3><div class=\"et_pb_blurb_description\"><div>P\u00e9rim\u00e8tre clair et domaines de protection mesurables<\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_12 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_14 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone et_flex_column_24_24_phoneWide et_flex_column_24_24_tabletWide et_flex_column_24_24_widescreen et_flex_column_24_24_ultraWide\">\n<div class=\"et_pb_text_4 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><div>La cybers\u00e9curit\u00e9 n\u2019est pas une question de peur \u2014 il s\u2019agit de <strong>r\u00e9duire les risques de mani\u00e8re responsable<\/strong>.<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_13 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_15 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone et_flex_column_24_24_phoneWide et_flex_column_24_24_tabletWide et_flex_column_24_24_widescreen et_flex_column_24_24_ultraWide\">\n<div class=\"et_pb_divider_3 et_pb_divider et_pb_space et_pb_divider_position_top et_pb_module\"><div class=\"et_pb_divider_internal\"><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_14 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_16 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone et_flex_column_24_24_phoneWide et_flex_column_24_24_tabletWide et_flex_column_24_24_widescreen et_flex_column_24_24_ultraWide\">\n<div class=\"et_pb_text_5 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><div><strong>Activez Cybersecurity<\/strong> ou incluez-le dans un pack Cloud et informatique pour une protection syst\u00e8me plus large.<\/div>\n<\/div><\/div>\n\n<div class=\"et_pb_module et_pb_button_module_wrapper et_pb_button_1_wrapper\"><a class=\"et_pb_button_1 et_pb_button et_pb_bg_layout_light et_pb_module et_flex_module\" href=\"https:\/\/motekx.be\/subscriptions\/\">Voir tous les forfaits<\/a><\/div>\n\n<div class=\"et_pb_text_6 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><p><span><!--ScriptorStartFragment--><\/span><\/p>\n<div class=\"scriptor-paragraph\" attribution=\"[object Object]\"><em><strong>Vous h\u00e9sitez ?<\/strong> Examinons d'abord votre projet.<\/em><\/div>\n<p><span><!--ScriptorEndFragment--><\/span><\/p>\n<p><span><!--ScriptorEndFragment--><\/span><\/p>\n<\/div><\/div>\n\n<div class=\"et_pb_module et_pb_button_module_wrapper et_pb_button_2_wrapper\"><a class=\"et_pb_button_2 et_pb_button et_pb_bg_layout_light et_pb_module et_flex_module\" href=\"https:\/\/motekx.be\/contact\/\">Contactez-nous<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":265322,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-267277","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/motekx.be\/fr\/wp-json\/wp\/v2\/pages\/267277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/motekx.be\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/motekx.be\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/motekx.be\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/motekx.be\/fr\/wp-json\/wp\/v2\/comments?post=267277"}],"version-history":[{"count":8,"href":"https:\/\/motekx.be\/fr\/wp-json\/wp\/v2\/pages\/267277\/revisions"}],"predecessor-version":[{"id":269465,"href":"https:\/\/motekx.be\/fr\/wp-json\/wp\/v2\/pages\/267277\/revisions\/269465"}],"up":[{"embeddable":true,"href":"https:\/\/motekx.be\/fr\/wp-json\/wp\/v2\/pages\/265322"}],"wp:attachment":[{"href":"https:\/\/motekx.be\/fr\/wp-json\/wp\/v2\/media?parent=267277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}