{"id":323,"date":"2020-10-08T16:02:18","date_gmt":"2020-10-08T22:02:18","guid":{"rendered":"https:\/\/idsinc.com\/?p=323"},"modified":"2026-03-09T15:16:52","modified_gmt":"2026-03-09T21:16:52","slug":"mobilite-ascendante-finement-reglee","status":"publish","type":"post","link":"https:\/\/idsinc.com\/fr\/finely-tuned-upward-mobility\/","title":{"rendered":"Finement r\u00e9gl\u00e9 - 005 Mobilit\u00e9 ascendante\u00a0: l&#039;importance de la gestion des appareils mobiles"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\">Par Bobby R. Williams Jr. le 08\/10\/20 07:00<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Rappelez-vous les bons vieux jours? L&#039;\u00e9poque d&#039;antan, o\u00f9 tout ce que vous deviez g\u00e9rer \u00e9tait des ordinateurs internes fixes et un serveur de messagerie sur site\u2026<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Si vous \u00eates du c\u00f4t\u00e9 de la commodit\u00e9 et de la productivit\u00e9, vous conviendrez que nous avons parcouru un long chemin depuis le bon vieux temps. Nous sommes pass\u00e9s des confins du bureau \u00e0 des terminaux factices distants, \u00e0 une connectivit\u00e9 \u00e0 distance compl\u00e8te. M\u00eame le stockage et les applications cloud s\u00e9curis\u00e9s sont d\u00e9sormais courants. Avec le d\u00e9veloppement d&#039;une main-d&#039;\u0153uvre flexible est venu l&#039;ordinateur portable\/notebook, permettant aux utilisateurs de profiter de toutes les fonctions d&#039;un ordinateur de bureau\u2026 mais seulement s&#039;ils pouvaient trouver une surface relativement s\u00fbre et plane\u2026 comme le haut d&#039;un tour par exemple.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p class=\"wp-block-paragraph\">Saisissez l&#039;appareil mobile. D&#039;ici 2020, 5,4 milliards de personnes auront au moins un appareil mobile, selon le rapport annuel de Cisco sur la croissance du trafic mobile. Nous comptons plus que jamais sur les appareils mobiles et la synchronisation des donn\u00e9es. Les t\u00e9l\u00e9phones intelligents et les tablettes nous permettent de faire plus que simplement consulter nos e-mails. Ces ordinateurs de poche donnent acc\u00e8s \u00e0 de nombreux syst\u00e8mes derri\u00e8re nos pare-feux d&#039;entreprise. Cet acc\u00e8s peut \u00eatre mis \u00e0 profit tout en faisant la queue pour un caf\u00e9. Ces appareils ont fourni une v\u00e9ritable mobilit\u00e9, les utilisateurs acc\u00e9dant, contr\u00f4lant et cr\u00e9ant des donn\u00e9es vitales pour les fonctions organisationnelles.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Heureusement, il existe des syst\u00e8mes d\u00e9velopp\u00e9s pour aider l&#039;\u00e9quipe technologique \u00e0 faire face \u00e0 la responsabilit\u00e9 suppl\u00e9mentaire des appareils mobiles. Un tel syst\u00e8me est appel\u00e9 (MDM) ou Mobile Device Management.<br><br><strong>Pourquoi est-ce important ?<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Un meilleur acc\u00e8s s&#039;accompagne d&#039;un plus grand risque. Ces risques persistent, que vous fournissiez des appareils \u00e0 votre \u00e9quipe ou que vous leur autorisiez \u00e0 connecter des appareils personnels au syst\u00e8me de l&#039;entreprise. Permettre aux appareils mobiles d&#039;acc\u00e9der \u00e0 votre r\u00e9seau et de contr\u00f4ler les donn\u00e9es augmente consid\u00e9rablement l&#039;exposition. Pour les mauvais acteurs, cela signifie plus d&#039;opportunit\u00e9s de violer votre syst\u00e8me. Les appareils mobiles sont fr\u00e9quemment perdus, vol\u00e9s ou endommag\u00e9s. Tous ces facteurs font de la gestion des appareils mobiles une partie int\u00e9grante de votre protocole de gouvernance de l&#039;information. Une solution MDM devrait amener votre organisation \u00e0 poser les questions suivantes\u00a0:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Quels appareils sont compatibles avec le syst\u00e8me que nous voulons d\u00e9ployer\u00a0?<\/li><li>Devrions-nous fournir des appareils ou autoriser les utilisateurs \u00e0 connecter leurs appareils personnels\u00a0?<\/li><li>Quelles fonctions devons-nous autoriser\u00a0? Quelles restrictions devrions-nous mettre en place ?<\/li><li>Pouvons-nous suivre l&#039;appareil\u00a0?<\/li><li>Pouvons-nous acc\u00e9der au contenu de l&#039;appareil, y compris les sauvegardes en direct\u00a0?<\/li><li>Pouvons-nous contr\u00f4ler l&#039;appareil \u00e0 distance, y compris les arr\u00eats et\/ou les effacements si n\u00e9cessaire\u00a0?<\/li><li>Pouvons-nous d\u00e9verrouiller le t\u00e9l\u00e9phone si l&#039;utilisateur oublie le mot de passe\u00a0?<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Ce ne sont que quelques exemples, mais vous obtenez l&#039;image. L&#039;utilisation de solutions MDM donne aux organisations le contr\u00f4le de la s\u00e9curit\u00e9 et du fonctionnement. Cela donne \u00e9galement \u00e0 un enqu\u00eateur des options suppl\u00e9mentaires si les appareils mobiles deviennent pertinents dans une enqu\u00eate.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Quel est mon plat \u00e0 emporter\u00a0?<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Si votre organisation autorise ou d\u00e9ploie des appareils mobiles, utilisez la gestion des appareils mobiles d&#039;un certain type. Vous devrez faire quelques recherches pour d\u00e9terminer la bonne configuration. Vous n&#039;avez pas besoin de le faire seul. Parlez \u00e0 un consultant qualifi\u00e9 ou \u00e0 un fournisseur de services expert pour obtenir des conseils. Ils peuvent vous aider \u00e0 faire ce qui suit :<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Choisissez ce qui convient le mieux \u00e0 votre organisation.<\/li><li>BYOD \u2013 Apportez votre propre appareil<\/li><li>CYOD - Choisissez votre propre appareil<\/li><li>COPE - Appartenant \u00e0 l&#039;entreprise, personnellement activ\u00e9<\/li><li>COBO - Appartenant \u00e0 l&#039;entreprise, entreprise uniquement<\/li><li>Automatisez la surveillance et la s\u00e9curit\u00e9 des appareils<\/li><li>Comprendre la compatibilit\u00e9 des appareils<\/li><li>Simplifiez-vous en d\u00e9ployant un outil polyvalent<\/li><li>Ex\u00e9cuter des protocoles et appliquer des politiques<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Ces \u00e9tapes sont g\u00e9n\u00e9rales mais peuvent avoir un impact consid\u00e9rable sur votre capacit\u00e9 \u00e0 choisir et \u00e0 mettre en \u0153uvre une solution MDM. C&#039;est une CAUSE juste qui affecte la s\u00e9curit\u00e9 de vos syst\u00e8mes (voyez ce que j&#039;ai fait l\u00e0-bas\u00a0?)<\/p>","protected":false},"excerpt":{"rendered":"<p>By Bobby R. Williams Jr. on 10\/8\/20 7:00 AM Remember the good ole days? The days of yester-year, when all you had to manage were stationary in-house computers and an on-prem email server \u2026 If you are on the side of convenience and productivity, you would agree we have come a long way since the [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":2391,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,33],"tags":[],"class_list":["post-323","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-data-sources","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Finely Tuned \u2014 005 Upward Mobility - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Upward Mobility: If your organization allows or deploys mobile devices, use Mobile Device Management of some kind.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/fr\/mobilite-ascendante-finement-reglee\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Finely Tuned \u2013 005 Upward Mobility: The Importance of Mobile Device Management\" \/>\n<meta property=\"og:description\" content=\"Upward Mobility: If your organization allows or deploys mobile devices, use Mobile Device Management of some kind.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/fr\/mobilite-ascendante-finement-reglee\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-08T22:02:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T21:16:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202013.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bobby R. Williams, Jr.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bobby R. Williams, Jr.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-upward-mobility\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-upward-mobility\\\/\"},\"author\":{\"name\":\"Bobby R. Williams, Jr.\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/51826f1058472210a83b02aaabace2ca\"},\"headline\":\"Finely Tuned \u2013 005 Upward Mobility: The Importance of Mobile Device Management\",\"datePublished\":\"2020-10-08T22:02:18+00:00\",\"dateModified\":\"2026-03-09T21:16:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-upward-mobility\\\/\"},\"wordCount\":587,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-upward-mobility\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202013.jpg\",\"articleSection\":[\"Blog\",\"Data Sources (Mobile, IoT, Non-Traditional)\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-upward-mobility\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-upward-mobility\\\/\",\"name\":\"Finely Tuned \u2014 005 Upward Mobility - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-upward-mobility\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-upward-mobility\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202013.jpg\",\"datePublished\":\"2020-10-08T22:02:18+00:00\",\"dateModified\":\"2026-03-09T21:16:52+00:00\",\"description\":\"Upward Mobility: If your organization allows or deploys mobile devices, use Mobile Device Management of some kind.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-upward-mobility\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/finely-tuned-upward-mobility\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-upward-mobility\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202013.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202013.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"The Importance of Mobile Device Management\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-upward-mobility\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Finely Tuned \u2013 005 Upward Mobility: The Importance of Mobile Device Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/51826f1058472210a83b02aaabace2ca\",\"name\":\"Bobby R. Williams, Jr.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g\",\"caption\":\"Bobby R. Williams, Jr.\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/fr\\\/author\\\/bobby\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Affinement r\u00e9gl\u00e9 - 005 Mobilit\u00e9 ascendante - iDiscovery Solutions","description":"Mobilit\u00e9 ascendante\u00a0: si votre organisation autorise ou d\u00e9ploie des appareils mobiles, utilisez une forme de gestion des appareils mobiles.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/fr\/mobilite-ascendante-finement-reglee\/","og_locale":"fr_FR","og_type":"article","og_title":"Finely Tuned \u2013 005 Upward Mobility: The Importance of Mobile Device Management","og_description":"Upward Mobility: If your organization allows or deploys mobile devices, use Mobile Device Management of some kind.","og_url":"https:\/\/idsinc.com\/fr\/mobilite-ascendante-finement-reglee\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2020-10-08T22:02:18+00:00","article_modified_time":"2026-03-09T21:16:52+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202013.jpg","type":"image\/jpeg"}],"author":"Bobby R. Williams, Jr.","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Bobby R. Williams, Jr.","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/finely-tuned-upward-mobility\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/finely-tuned-upward-mobility\/"},"author":{"name":"Bobby R. Williams, Jr.","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/51826f1058472210a83b02aaabace2ca"},"headline":"Finely Tuned \u2013 005 Upward Mobility: The Importance of Mobile Device Management","datePublished":"2020-10-08T22:02:18+00:00","dateModified":"2026-03-09T21:16:52+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/finely-tuned-upward-mobility\/"},"wordCount":587,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/finely-tuned-upward-mobility\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202013.jpg","articleSection":["Blog","Data Sources (Mobile, IoT, Non-Traditional)"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/finely-tuned-upward-mobility\/","url":"https:\/\/idsinc.com\/finely-tuned-upward-mobility\/","name":"Affinement r\u00e9gl\u00e9 - 005 Mobilit\u00e9 ascendante - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/finely-tuned-upward-mobility\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/finely-tuned-upward-mobility\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202013.jpg","datePublished":"2020-10-08T22:02:18+00:00","dateModified":"2026-03-09T21:16:52+00:00","description":"Mobilit\u00e9 ascendante\u00a0: si votre organisation autorise ou d\u00e9ploie des appareils mobiles, utilisez une forme de gestion des appareils mobiles.","breadcrumb":{"@id":"https:\/\/idsinc.com\/finely-tuned-upward-mobility\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/finely-tuned-upward-mobility\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/finely-tuned-upward-mobility\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202013.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202013.jpg","width":2500,"height":1250,"caption":"The Importance of Mobile Device Management"},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/finely-tuned-upward-mobility\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Finely Tuned \u2013 005 Upward Mobility: The Importance of Mobile Device Management"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Solutions d&#039;iD\u00e9couverte","description":"Utilisez les donn\u00e9es \u00e0 votre avantage dans la salle d\u2019audience","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Solutions d&#039;iD\u00e9couverte","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant \u00e0 l&#039;int\u00e9rieur qu&#039;\u00e0 l&#039;ext\u00e9rieur de la salle d&#039;audience. Les experts en la mati\u00e8re et les strat\u00e8ges en donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un passif.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/51826f1058472210a83b02aaabace2ca","name":"Bobby R. Williams, Jr.","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g","caption":"Bobby R. Williams, Jr."},"url":"https:\/\/idsinc.com\/fr\/author\/bobby\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/comments?post=323"}],"version-history":[{"count":1,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/323\/revisions"}],"predecessor-version":[{"id":9501,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/323\/revisions\/9501"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media\/2391"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media?parent=323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/categories?post=323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/tags?post=323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}