{"id":34781,"date":"2026-05-04T10:51:39","date_gmt":"2026-05-04T08:51:39","guid":{"rendered":"https:\/\/www.airicom.com\/blog\/?p=34781"},"modified":"2026-05-04T11:47:02","modified_gmt":"2026-05-04T09:47:02","slug":"cybersecurite-ot-securiser-lacces-distant-a-vos-machines","status":"publish","type":"post","link":"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/","title":{"rendered":"Cybers\u00e9curit\u00e9 OT : S\u00e9curiser l\u2019acc\u00e8s distant \u00e0 vos machines"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"34781\" class=\"elementor elementor-34781\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0abb49b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0abb49b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-585683b\" data-id=\"585683b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-da2f0d5 elementor-widget elementor-widget-image\" data-id=\"da2f0d5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" fetchpriority=\"high\" decoding=\"async\" width=\"1536\" height=\"864\" src=\"https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/05\/Cybersecurite-ot.jpg\" class=\"attachment-full size-full wp-image-34810\" alt=\"Cybers\u00e9curit\u00e9 OT\" srcset=\"https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/05\/Cybersecurite-ot.jpg 1536w, https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/05\/Cybersecurite-ot-1280x720.jpg 1280w, https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/05\/Cybersecurite-ot-980x551.jpg 980w, https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/05\/Cybersecurite-ot-480x270.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1536px, 100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7d933f3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7d933f3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1fbceb2\" data-id=\"1fbceb2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-69124b6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"69124b6\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-b909ead\" data-id=\"b909ead\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e2f511c elementor-widget elementor-widget-heading\" data-id=\"e2f511c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">L\u2019essentiel en 4 points cl\u00e9s<\/span>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5b0a6f elementor-widget elementor-widget-text-editor\" data-id=\"a5b0a6f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Face \u00e0 la directive <strong>NIS2<\/strong> et aux exigences de la norme <strong>IEC 62443<\/strong>, s\u00e9curiser l&#8217;acc\u00e8s distant \u00e0 vos machines n&#8217;est plus une option. Pour prot\u00e9ger vos actifs industriels et garantir la continuit\u00e9 de service, voici les points cl\u00e9s \u00e0 retenir :<br \/><br \/><\/p><ul><li><strong>Conformit\u00e9 NIS2<\/strong> : La s\u00e9curit\u00e9 de votre supply chain devient une priorit\u00e9 ; vos machines doivent \u00eatre &#8220;Secure-by-Design&#8221;.<br \/><br \/><\/li><li><strong>Contr\u00f4les critiques<\/strong> : L&#8217;authentification multi-facteurs (<strong>MFA<\/strong>), la segmentation r\u00e9seau et le principe du <strong>moindre privil\u00e8ge<\/strong> sont d\u00e9sormais les standards obligatoires.<br \/><br \/><\/li><li><strong>Ma\u00eetrise de l\u2019acc\u00e8s<\/strong> : L&#8217;exploitant (Asset Owner) doit garder le contr\u00f4le final via des validations physiques (bouton local) et une tra\u00e7abilit\u00e9 totale (logs).<br \/><br \/><\/li><li><strong>La solution Ewon<\/strong> : Les passerelles <strong>Cosy+<\/strong> et <strong>Flexy<\/strong>, coupl\u00e9es \u00e0 la solution Cloud <strong>Talk2m<\/strong>, offrent un \u00e9cosyst\u00e8me certifi\u00e9 ISO 27001 et pr\u00eat pour l&#8217;audit.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-284e474 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"284e474\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b6f6338\" data-id=\"b6f6338\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fa415b1 elementor-widget elementor-widget-text-editor\" data-id=\"fa415b1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>L&rsquo;&egrave;re de l&rsquo;isolement des syst&egrave;mes industriels est officiellement r&eacute;volue. Aujourd&#8217;hui, la connectivit&eacute; est le moteur de l&#8217;efficacit&eacute; op&eacute;rationnelle : elle permet la maintenance pr&eacute;dictive, le diagnostic &agrave; distance et l&#8217;optimisation des processus en temps r&eacute;el. Cependant, cette ouverture des r&eacute;seaux op&eacute;rationnels (OT) vers le monde ext&eacute;rieur engendre une surface d&#8217;attaque sans pr&eacute;c&eacute;dent. Entre les ransomwares ciblant les infrastructures critiques et les r&eacute;gulations europ&eacute;ennes qui se durcissent, la question n&#8217;est plus de savoir si vous devez s&eacute;curiser vos acc&egrave;s, mais comment le faire de mani&egrave;re infaillible.<\/p>\n<p>Dans ce contexte, la <strong>directive europ&eacute;enne NIS2<\/strong> et la norme internationale <strong>ISA\/IEC 62443<\/strong> s&#8217;imposent comme les nouveaux piliers de la r&eacute;silience industrielle. Cet article d&eacute;taille comment les solutions <strong>Ewon <\/strong>vous permettent de b&acirc;tir une architecture d&#8217;acc&egrave;s distant s&eacute;curis&eacute;e, conforme aux exigences les plus strictes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-638bae2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"638bae2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5067103\" data-id=\"5067103\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2539525 elementor-widget elementor-widget-text-editor\" data-id=\"2539525\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Le nouveau paysage r\u00e9glementaire : Pourquoi NIS2 change la donne ?<\/strong><\/h2><p><br \/>La <a href=\"https:\/\/www.airicom.com\/blog\/faq-iot\/faq-ewon\/repondre-a-la-directive-nis2-pour-vos-acces-distants\/\"><strong>directive NIS2<\/strong><\/a> (Network and Information Security) marque un tournant majeur. Elle ne se contente plus de cibler les op\u00e9rateurs de services essentiels ; elle \u00e9largit son p\u00e9rim\u00e8tre \u00e0 de nombreuses entit\u00e9s importantes et, surtout, elle introduit la notion de <strong>responsabilit\u00e9 de la cha\u00eene d&#8217;approvisionnement<\/strong>.<br \/><br \/><\/p><h3 style=\"color: #083369;\"><strong>La responsabilit\u00e9 partag\u00e9e<\/strong><\/h3><p><br \/>D\u00e9sormais, les propri\u00e9taires d&#8217;actifs industriels sont responsables de la s\u00e9curit\u00e9 des solutions livr\u00e9es par leurs fournisseurs. Cela signifie que les constructeurs de machines (OEM) doivent int\u00e9grer la cybers\u00e9curit\u00e9 &#8220;by design&#8221; (d\u00e8s la conception). Une machine livr\u00e9e aujourd&#8217;hui sans m\u00e9canisme d&#8217;acc\u00e8s distant s\u00e9curis\u00e9 peut devenir un passif juridique et op\u00e9rationnel pour l&#8217;utilisateur final.<br \/><br \/><\/p><h3 style=\"color: #083369;\"><strong>L&#8217;alignement avec l&#8217;IEC 62443<\/strong><\/h3><p><br \/>Heureusement, il n&#8217;est pas n\u00e9cessaire de r\u00e9inventer la roue. La norme <strong>IEC 62443<\/strong> fournit un cadre technique parfait pour r\u00e9pondre aux exigences de NIS2. Elle d\u00e9finit des niveaux de s\u00e9curit\u00e9 (Security Levels &#8211; SL1 \u00e0 SL4) et des exigences fondamentales comme le contr\u00f4le d&#8217;authentification, l&#8217;int\u00e9grit\u00e9 du syst\u00e8me et la confidentialit\u00e9 des donn\u00e9es.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5276ee5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5276ee5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8e6768a\" data-id=\"8e6768a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc0e797 elementor-widget elementor-widget-text-editor\" data-id=\"fc0e797\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Les piliers du contr\u00f4le d&#8217;acc\u00e8s : identit\u00e9 et authentification<\/strong><\/h2><p><br \/>La premi\u00e8re ligne de d\u00e9fense est de savoir qui se connecte, quand et comment.<br \/><br \/><\/p><h3 style=\"color: #083369;\"><strong>L\u2019authentification multi-facteurs (MFA) : le standard obligatoire<\/strong><\/h3><p><br \/>Le simple mot de passe est mort. Pour respecter la norme IEC 62443-3-3, l&#8217;usage du MFA est indispensable pour tout acc\u00e8s via un r\u00e9seau non s\u00e9curis\u00e9 (Internet).<br \/><br \/><\/p><ul><li><strong>La solution Ewon :<\/strong> Avec le client VPN <a href=\"https:\/\/airicom.com\/Ecatcher-Client-VPN-pour-acces-a-distance-securise\/ECATCHER-SOFT-VPN\"><strong>Ecatcher<\/strong><\/a> et la plateforme cloud <a href=\"https:\/\/airicom.com\/Talk2m-Service-cloud-pour-la-connectivite-a-distance\/Talk2m\"><strong>Talk2m<\/strong><\/a>, l&#8217;administrateur peut activer la double authentification. Lors de la connexion, l&#8217;utilisateur re\u00e7oit un code unique par SMS. Sans ce second facteur, l&#8217;acc\u00e8s est impossible, m\u00eame si le mot de passe a \u00e9t\u00e9 vol\u00e9.<br \/><br \/><\/li><\/ul><h3 style=\"color: #083369;\"><strong>La gestion des privil\u00e8ges (MoLP)<\/strong><\/h3><p><br \/>Le principe du &#8220;Moindre Privil\u00e8ge&#8221; (Least Privilege) stipule qu&#8217;un utilisateur ne doit avoir acc\u00e8s qu&#8217;aux ressources strictement n\u00e9cessaires \u00e0 sa mission.<br \/><br \/><\/p><ul><li><strong>La solution Talk2m Pro :<\/strong> Nous vous aidons \u00e0 configurer vos comptes <strong>Talk2m Pro<\/strong> pour cr\u00e9er des groupes d&#8217;utilisateurs et des &#8220;pools&#8221; de machines. Un technicien de maintenance A ne verra que les machines du site A, tandis que l&#8217;administrateur conserve une vue d&#8217;ensemble.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82e1b48 elementor-widget elementor-widget-image\" data-id=\"82e1b48\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1248\" height=\"672\" src=\"https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/04\/solution-talk2m.jpg\" class=\"attachment-full size-full wp-image-34783\" alt=\"\" srcset=\"https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/04\/solution-talk2m.jpg 1248w, https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/04\/solution-talk2m-980x528.jpg 980w, https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/04\/solution-talk2m-480x258.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1248px, 100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-043ba44 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"043ba44\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bdff2de\" data-id=\"bdff2de\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b14d990 elementor-widget elementor-widget-text-editor\" data-id=\"b14d990\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Segmentation r\u00e9seau et protection des flux<\/strong><\/h2><p>L&#8217;une des plus grandes craintes des directeurs informatiques (DSI) est le &#8220;mouvement lat\u00e9ral&#8221; : qu&#8217;un hacker entre par une machine de production et remonte jusqu&#8217;au r\u00e9seau corporate (ERP, serveurs).<br \/><br \/><\/p><h3 style=\"color: #083369;\"><strong>Sc\u00e9narios de segmentation avec Ewon Cosy+ et Ewon Flexy<\/strong><\/h3><p><br \/>La segmentation consiste \u00e0 diviser le r\u00e9seau en zones de s\u00e9curit\u00e9.<br \/><br \/><\/p><ol><li><strong>Isolation LAN\/WAN :<\/strong> Par d\u00e9faut, les passerelles Ewon isolent totalement le r\u00e9seau de la machine du r\u00e9seau de l&#8217;usine.<br \/><br \/><\/li><li><strong>Pare-feu Cloud :<\/strong> Via Talk2m, vous pouvez d\u00e9finir un filtrage &#8220;Ultra&#8221; qui limite le trafic VPN aux seuls protocoles n\u00e9cessaires (ex: port 102 pour le S7 d&#8217;un automate Siemens).<br \/><br \/><\/li><li><strong>VLAN et Segmentation Physique (SL2) :<\/strong> Pour les machines complexes, l&#8217;utilisation de <a href=\"https:\/\/airicom.com\/Ewon-Flexy-205-Gateway-IoT-robuste\/Ewon-Flexy-205\"><strong>Ewon Flexy<\/strong><\/a> combin\u00e9e \u00e0 des switchs administrables permet de cr\u00e9er des VLANs, isolant par exemple le r\u00e9seau de cam\u00e9ras de celui du pilotage process.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-07972ba elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"07972ba\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8993668\" data-id=\"8993668\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e07aac elementor-widget elementor-widget-text-editor\" data-id=\"3e07aac\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Surveillance et tra\u00e7abilit\u00e9 : l&#8217;audit log<\/strong><\/h2><p>La <a href=\"https:\/\/cybersecurite-ot.fr\/convergence-it-ot\/cybersecurite-ot-ia-le-combo-catalyseur-de-la-convergence-it-ot\/\"><strong>cybers\u00e9curit\u00e9 OT<\/strong><\/a> ne doit pas d\u00e9poss\u00e9der l&#8217;exploitant de son contr\u00f4le. L&#8217;acc\u00e8s distant ne doit pas \u00eatre &#8220;toujours ouvert&#8221;.<br \/><br \/><\/p><ul><li><strong>Le Switch physique :<\/strong> Une pratique recommand\u00e9e par l&#8217;IEC 62443-2-4 consiste \u00e0 subordonner la connexion VPN \u00e0 une validation locale. Ewon dispose d&#8217;une entr\u00e9e num\u00e9rique : le technicien sur site doit tourner une cl\u00e9 ou presser un bouton pour &#8220;ouvrir&#8221; le tunnel.<br \/><br \/><\/li><li><strong>Tra\u00e7abilit\u00e9 compl\u00e8te :<\/strong> Talk2m g\u00e9n\u00e8re des rapports de connexion d\u00e9taill\u00e9s. Qui s&#8217;est connect\u00e9 ? Combien de temps ? Pour faire quoi ? Ces logs sont cruciaux pour l&#8217;auditabilit\u00e9 demand\u00e9e par NIS2.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-55f062e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"55f062e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3e15596\" data-id=\"3e15596\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-94949d5 elementor-widget elementor-widget-text-editor\" data-id=\"94949d5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Gestion des vuln\u00e9rabilit\u00e9s et Patch Management<\/strong><\/h2><p>Une passerelle IoT n&#8217;est pas un \u00e9quipement &#8220;fig\u00e9&#8221;. Elle doit vivre pour rester s\u00e9curis\u00e9e.<br \/><br \/><\/p><ul><li><strong>Gestion centralis\u00e9e des Firmwares :<\/strong> HMS simplifie la maintenance avec sa fonction de <strong>Firmware Management<\/strong> dans <strong>Ecatcher<\/strong>. Les administrateurs peuvent visualiser instantan\u00e9ment quels bo\u00eetiers Ewon n\u00e9cessitent une mise \u00e0 jour de s\u00e9curit\u00e9 et d\u00e9ployer les correctifs \u00e0 distance sur l&#8217;ensemble du parc de mani\u00e8re coordonn\u00e9e, sans perturber la production.<br \/><br \/><\/li><li><strong>Secure Boot :<\/strong> Le nouveau <a href=\"https:\/\/airicom.com\/Ewon-Cosy-4G-Gateway-IoT-avec-4G-et-VPN\/Ewon-Cosy-4G\"><strong>Ewon Cosy+<\/strong><\/a> int\u00e8gre un \u00e9l\u00e9ment s\u00e9curis\u00e9 (puce mat\u00e9rielle) qui garantit que seul le firmware officiel de HMS Networks peut \u00eatre ex\u00e9cut\u00e9, prot\u00e9geant ainsi contre les logiciels malveillants au d\u00e9marrage.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f606479 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f606479\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-871d198\" data-id=\"871d198\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8e144df elementor-widget elementor-widget-text-editor\" data-id=\"8e144df\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Une solution reconnue et certifi\u00e9e<\/strong><\/h2><p><br \/>La cybers\u00e9curit\u00e9 industrielle ne repose pas uniquement sur la technique, mais aussi sur la confiance envers le fournisseur. HMS Networks est certifi\u00e9 <strong>ISO 27001<\/strong>, le standard mondial pour le management de la s\u00e9curit\u00e9 de l&#8217;information. Cette certification garantit que les employ\u00e9s de HMS sont form\u00e9s aux cyber-risques et que le service Talk2m est r\u00e9guli\u00e8rement audit\u00e9.<\/p><p>De plus, HMS collabore avec des partenaires de cybers\u00e9curit\u00e9 externes comme <strong>NVISO<\/strong> pour r\u00e9aliser des tests d&#8217;intrusion r\u00e9guliers et s&#8217;assurer que les solutions Ewon r\u00e9sistent aux m\u00e9thodes d&#8217;attaque les plus r\u00e9centes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3a4cb9e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3a4cb9e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-06ef238\" data-id=\"06ef238\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bbf6a3d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bbf6a3d\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7e69517\" data-id=\"7e69517\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a784d23 elementor-widget elementor-widget-image\" data-id=\"a784d23\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/airicom.com\/Trout-Access-Gate-Plateforme-de-cybersecurite-pour-reseaux-OT\/Trout-Access-Gate\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"210\" height=\"300\" src=\"https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/04\/Ewon_product_family_NO_mirror_FX-210x300.png\" class=\"attachment-medium size-medium wp-image-34785\" alt=\"\" srcset=\"https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/04\/Ewon_product_family_NO_mirror_FX-210x300.png 210w, https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/04\/Ewon_product_family_NO_mirror_FX.png 240w\" sizes=\"(max-width: 210px) 100vw, 210px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-914b70c\" data-id=\"914b70c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d213426 elementor-widget elementor-widget-heading\" data-id=\"d213426\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">S\u00e9curisez vos acc\u00e8s distants avec les solutions Ewon\n<\/span>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea439df elementor-widget elementor-widget-text-editor\" data-id=\"ea439df\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Optez pour la r\u00e9f\u00e9rence mondiale de la t\u00e9l\u00e9maintenance industrielle. Nos solutions <strong>Ewon Cosy+<\/strong> et <strong>Ewon Flexy<\/strong> vous garantissent une connectivit\u00e9 simple, une mise en conformit\u00e9 <strong>NIS2<\/strong> et une protection <strong>Zero Trust<\/strong> certifi\u00e9e ISO 27001.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c844a4 elementor-widget elementor-widget-button\" data-id=\"3c844a4\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/airicom.com\/Fournisseurs\/HMS\/Ewon\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Je d\u00e9couvre les solutions Ewon<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aa946eb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aa946eb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-829299b\" data-id=\"829299b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-59dd450 elementor-widget elementor-widget-text-editor\" data-id=\"59dd450\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Pourquoi choisir Ewon et l\u2019accompagnement Airicom ?<\/strong><\/h2><p><br \/>Vendre une solution de t\u00e9l\u00e9maintenance est une chose, s\u00e9curiser une infrastructure industrielle en est une autre. C&#8217;est ici qu&#8217;Airicom apporte sa valeur ajout\u00e9e de distributeur sp\u00e9cialis\u00e9. Chez <strong>Airicom<\/strong>, nous ne nous contentons pas de livrer du mat\u00e9riel. Nous accompagnons nos clients fran\u00e7ais (OEM, Int\u00e9grateurs, End-users) sur :<\/p><p>\u00a0<\/p><ul><li><strong>L&#8217;audit de configuration :<\/strong> S&#8217;assurer que vos Ewon sont param\u00e9tr\u00e9s selon les &#8220;Best Practices&#8221; du guide de cybers\u00e9curit\u00e9 (changement des mots de passe par d\u00e9faut, activation du MFA, restriction des ports).<br \/><br \/><\/li><li><strong>La formation :<\/strong> Monter en comp\u00e9tence vos \u00e9quipes techniques sur la gestion de Talk2m et la mise en conformit\u00e9 IEC 62443.<br \/><br \/><\/li><li><strong>Le support local :<\/strong> Une expertise de proximit\u00e9 pour r\u00e9soudre vos probl\u00e9matiques de connectivit\u00e9 complexe (4G\/5G, filtrage IT restrictif, certificats).<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d0aaf3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d0aaf3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-721e6e6\" data-id=\"721e6e6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-81a6bff elementor-widget elementor-widget-text-editor\" data-id=\"81a6bff\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Tableau r\u00e9capitulatif : conformit\u00e9 et mesures de cybers\u00e9curit\u00e9 OT\n<\/strong><\/h2>\n&nbsp;\n<table style=\"width: 100%; border-collapse: collapse; font-family: sans-serif; box-shadow: 0 2px 10px rgba(0,0,0,0.1);\">\n<thead>\n<tr style=\"background-color: #083369; color: white;\">\n<th style=\"padding: 12px; border: 1px solid #ddd; text-align: left;\"><span style=\"color: #ffffff;\">Cat\u00e9gorie<\/span><\/th>\n<th style=\"padding: 12px; border: 1px solid #ddd; text-align: left;\"><span style=\"color: #ffffff;\">Exigence NIS2 \/ IEC 62443<\/span><\/th>\n<th style=\"padding: 12px; border: 1px solid #ddd; text-align: left;\"><span style=\"color: #ffffff;\">Solution Ewon (Talk2m \/ Passerelles)<\/span><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"background-color: #ffffff;\">\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Contr\u00f4le d&#8217;acc\u00e8s<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\">Authentification, Multi-Facteurs (MFA)<\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Ecatcher : <\/strong>Validation par code SMS unique pour chaque technicien.<\/td>\n<\/tr>\n<tr style=\"background-color: #f8f9fa;\">\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Gestion des droits<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\">Principe du Moindre, Privil\u00e8ge (Least Privilege)<\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Talk2m Pro : <\/strong>Groupes d&#8217;utilisateurs et acc\u00e8s restreints par &#8220;pools&#8221; de machines.<\/td>\n<\/tr>\n<tr style=\"background-color: #ffffff;\">\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Segmentation<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\">Isolation des r\u00e9seaux (Zonage et Conduits)<\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Ewon Cosy+ \/ Flexy : <\/strong>S\u00e9paration physique LAN\/WAN et pare-feu &#8220;Ultra&#8221; (Deep Packet Inspection).<\/td>\n<\/tr>\n<tr style=\"background-color: #f8f9fa;\">\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Tra\u00e7abilit\u00e9<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\">Monitoring et Journalisation des activit\u00e9s<\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Logs de connexion : <\/strong>Rapports d\u00e9taill\u00e9s (qui, quand, combien de temps) exportables en CSV.<\/td>\n<\/tr>\n<tr style=\"background-color: #ffffff;\">\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Maintenance<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\">Gestion des correctifs (Patch Management)<\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Firmware Management : <\/strong>Mise \u00e0 jour centralis\u00e9e et \u00e0 distance des passerelles via le Cloud.<\/td>\n<\/tr>\n  <tr style=\"background-color: #f8f9fa;\">\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Tra\u00e7abilit\u00e9<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\">Monitoring et Journalisation des activit\u00e9s<\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Logs de connexion : <\/strong>Rapports d\u00e9taill\u00e9s (qui, quand, combien de temps) exportables en CSV.<\/td>\n<\/tr>\n  <tr style=\"background-color: #f8f9fa;\">\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Int\u00e9grit\u00e9 mat\u00e9rielle<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\">Protection contre les logiciels non autoris\u00e9s<\/td>\n    <td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Cosy+ : <\/strong>Puce Secure Element int\u00e9gr\u00e9e (EAL 6+) et d\u00e9marrage s\u00e9curis\u00e9 (Root of Trust).<\/td>\n<\/tr>\n  <tr style=\"background-color: #f8f9fa;\">\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Contr\u00f4le local<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\">Approbation pr\u00e9alable de l&#8217;Asset Owner<\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Entr\u00e9e num\u00e9rique : <\/strong>Activation du tunnel VPN uniquement via un commutateur physique local.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2f583a6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2f583a6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-87b1fa2\" data-id=\"87b1fa2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2c12cab elementor-widget elementor-widget-text-editor\" data-id=\"2c12cab\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Conclusion : faire de la s\u00e9curit\u00e9 un avantage comp\u00e9titif<\/strong><\/h2><p><br \/>La s\u00e9curisation des acc\u00e8s distants n&#8217;est plus une option technique r\u00e9serv\u00e9e aux experts, c&#8217;est un imp\u00e9ratif strat\u00e9gique dict\u00e9 par NIS2 et l&#8217;IEC 62443. Pour les constructeurs de machines, adopter les solutions <a href=\"https:\/\/airicom.com\/Fournisseurs\/HMS\/\"><strong>HMS Networks<\/strong><\/a>, c&#8217;est offrir \u00e0 leurs clients une garantie de conformit\u00e9 et de s\u00e9r\u00e9nit\u00e9.<\/p><p>En combinant une authentification forte, une segmentation r\u00e9seau rigoureuse, un contr\u00f4le physique des acc\u00e8s et une gestion centralis\u00e9e des correctifs, vous b\u00e2tissez une infrastructure OT r\u00e9siliente. HMS Networks ne se contente pas de vous fournir un tunnel VPN ; il vous offre un \u00e9cosyst\u00e8me complet pour naviguer en toute s\u00e9curit\u00e9 dans l&#8217;industrie 4.0.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-177538b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"177538b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7eca2ee\" data-id=\"7eca2ee\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-15c4a2c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"15c4a2c\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-746e653\" data-id=\"746e653\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44fd32b elementor-widget elementor-widget-heading\" data-id=\"44fd32b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Pr\u00eat \u00e0 auditer vos acc\u00e8s machines ? \n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80b6339 elementor-widget elementor-widget-text-editor\" data-id=\"80b6339\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tNos experts r\u00e9alisent une \u00e9valuation de votre architecture actuelle et vous montrent comment les bo\u00eetiers Ewon peuvent simplifier votre conformit\u00e9 NIS2. \n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89d967b elementor-widget elementor-widget-button\" data-id=\"89d967b\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/airicom.com\/contactez-airicom\/commercial\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contactez Airicom<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-da075cd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"da075cd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1fecad1\" data-id=\"1fecad1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5185a8c elementor-widget elementor-widget-heading\" data-id=\"5185a8c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQ : Tout savoir sur le comptage des personnes sans fil<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9dbf205 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9dbf205\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-47c4756\" data-id=\"47c4756\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21809fa elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"21809fa\" data-element_type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-21809fa\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"21809fa\" data-accordion-type=\"toggle\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"1-nis2-impose-t-elle-de-nouvelles-rgles-pour-mes-machines-\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-3511\"><span class=\"eael-accordion-tab-title\">1. NIS2 impose-t-elle de nouvelles r\u00e8gles pour mes machines ?<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-3511\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"1-nis2-impose-t-elle-de-nouvelles-rgles-pour-mes-machines-\">Oui. La directive impose une s\u00e9curit\u00e9 stricte de la supply chain. En tant que fabricant ou int\u00e9grateur, vous devez prouver que vos acc\u00e8s distants sont s\u00e9curis\u00e9s. Les solutions Ewon, align\u00e9es sur l&#8217;IEC 62443, valident cette conformit\u00e9.<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"2-comment-talk2m-rassure-t-il-les-directions-informatiques-dsi-\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-3512\"><span class=\"eael-accordion-tab-title\">2. Comment Talk2m rassure-t-il les directions informatiques (DSI) ?<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-3512\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"2-comment-talk2m-rassure-t-il-les-directions-informatiques-dsi-\">Le cloud Talk2m est certifi\u00e9 ISO 27001. Il utilise uniquement des connexions sortantes (port 443), \u00e9vitant ainsi d&#8217;ouvrir des br\u00e8ches dans le pare-feu du client final. C&#8217;est le standard accept\u00e9 par l&#8217;IT industrielle.<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"3-peut-on-empcher-un-accs-distant-non-sollicit-\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-3513\"><span class=\"eael-accordion-tab-title\">3. Peut-on emp\u00eacher un acc\u00e8s distant non sollicit\u00e9 ?<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-3513\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"3-peut-on-empcher-un-accs-distant-non-sollicit-\">Absolument. Une entr\u00e9e num\u00e9rique sur l&#8217;Ewon permet de subordonner l&#8217;acc\u00e8s VPN \u00e0 une action physique locale (bouton ou cl\u00e9). L&#8217;exploitant garde ainsi le contr\u00f4le total sur le moment o\u00f9 la machine devient accessible.<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"4-quelle-est-la-force-du-nouvel-ewon-cosy-\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-3514\"><span class=\"eael-accordion-tab-title\">4. Quelle est la force du nouvel Ewon Cosy+ ?<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-3514\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"4-quelle-est-la-force-du-nouvel-ewon-cosy-\">Il int\u00e8gre un \u00e9l\u00e9ment s\u00e9curis\u00e9 (puce mat\u00e9rielle) certifi\u00e9 EAL 6+. Cela garantit un &#8220;Root of Trust&#8221; (racine de confiance) : le mat\u00e9riel v\u00e9rifie lui-m\u00eame l&#8217;int\u00e9grit\u00e9 de son logiciel pour bloquer toute tentative d&#8217;intrusion d\u00e8s le d\u00e9marrage.<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"5-quel-est-lavantage-de-laccompagnement-airicom-\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"5\" aria-controls=\"elementor-tab-content-3515\"><span class=\"eael-accordion-tab-title\">5. Quel est l'avantage de l'accompagnement Airicom ?<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-3515\" class=\"eael-accordion-content clearfix\" data-tab=\"5\" aria-labelledby=\"5-quel-est-lavantage-de-laccompagnement-airicom-\">La cybers\u00e9curit\u00e9 est une question de param\u00e9trage. Airicom ne livre pas juste un bo\u00eetier : nous configurons avec vous les acc\u00e8s (MFA, segmentation, privil\u00e8ges) pour garantir que votre solution est r\u00e9ellement \u00e9tanche et conforme aux audits.<\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>L\u2019essentiel en 4 points cl\u00e9s Face \u00e0 la directive NIS2 et aux exigences de la norme IEC 62443, s\u00e9curiser l&#8217;acc\u00e8s distant \u00e0 vos machines n&#8217;est plus une option. Pour prot\u00e9ger vos actifs industriels et garantir la continuit\u00e9 de service, voici les points cl\u00e9s \u00e0 retenir : Conformit\u00e9 NIS2 : La s\u00e9curit\u00e9 de votre supply chain [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":34810,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[461,144],"tags":[],"class_list":["post-34781","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite-ot","category-ewon"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.7.1 (Yoast SEO v26.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybers\u00e9curit\u00e9 OT : S\u00e9curiser l\u2019acc\u00e8s distant \u00e0 vos machines<\/title>\n<meta name=\"description\" content=\"S\u00e9curisez vos acc\u00e8s distants avec Ewon. Guide complet sur la conformit\u00e9 NIS2, la norme IEC 62443 et l&#039;accompagnement expert d&#039;Airicom.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cybers\u00e9curit\u00e9 OT : S\u00e9curiser l\u2019acc\u00e8s distant \u00e0 vos machines\" \/>\n<meta name=\"twitter:description\" content=\"S\u00e9curisez vos acc\u00e8s distants avec Ewon. Guide complet sur la conformit\u00e9 NIS2, la norme IEC 62443 et l&#039;accompagnement expert d&#039;Airicom.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/05\/Cybersecurite-ot.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@airicom3\" \/>\n<meta name=\"twitter:site\" content=\"@airicom3\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sarra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/\"},\"author\":{\"name\":\"Sarra\",\"@id\":\"https:\/\/www.airicom.com\/blog\/#\/schema\/person\/9b03e2f4042442181fb95ef4ce971af7\"},\"headline\":\"Cybers\u00e9curit\u00e9 OT : S\u00e9curiser l\u2019acc\u00e8s distant \u00e0 vos machines\",\"datePublished\":\"2026-05-04T08:51:39+00:00\",\"dateModified\":\"2026-05-04T09:47:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/\"},\"wordCount\":2015,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.airicom.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/05\/Cybersecurite-ot.jpg\",\"articleSection\":[\"Cybers\u00e9curit\u00e9 OT\",\"Ewon\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/\",\"url\":\"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/\",\"name\":\"Cybers\u00e9curit\u00e9 OT : S\u00e9curiser l\u2019acc\u00e8s distant \u00e0 vos machines\",\"isPartOf\":{\"@id\":\"https:\/\/www.airicom.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/05\/Cybersecurite-ot.jpg\",\"datePublished\":\"2026-05-04T08:51:39+00:00\",\"dateModified\":\"2026-05-04T09:47:02+00:00\",\"description\":\"S\u00e9curisez vos acc\u00e8s distants avec Ewon. Guide complet sur la conformit\u00e9 NIS2, la norme IEC 62443 et l'accompagnement expert d'Airicom.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/#primaryimage\",\"url\":\"https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/05\/Cybersecurite-ot.jpg\",\"contentUrl\":\"https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/05\/Cybersecurite-ot.jpg\",\"width\":1536,\"height\":864,\"caption\":\"Cybers\u00e9curit\u00e9 OT\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.airicom.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9 OT : S\u00e9curiser l\u2019acc\u00e8s distant \u00e0 vos machines\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.airicom.com\/blog\/#website\",\"url\":\"https:\/\/www.airicom.com\/blog\/\",\"name\":\"Airicom - Expert IoT et M2M depuis plus de 20 ans\",\"description\":\"Airicom - Expert IoT et M2M depuis plus de 20 ans\",\"publisher\":{\"@id\":\"https:\/\/www.airicom.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.airicom.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.airicom.com\/blog\/#organization\",\"name\":\"Airicom - Expert IoT et M2M depuis plus de 20 ans\",\"url\":\"https:\/\/www.airicom.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.airicom.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/airicom.com\/blog\/wp-content\/uploads\/2020\/04\/logo-airicom-2020-200.jpg\",\"contentUrl\":\"https:\/\/airicom.com\/blog\/wp-content\/uploads\/2020\/04\/logo-airicom-2020-200.jpg\",\"width\":200,\"height\":37,\"caption\":\"Airicom - Expert IoT et M2M depuis plus de 20 ans\"},\"image\":{\"@id\":\"https:\/\/www.airicom.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/airicom3\",\"https:\/\/www.linkedin.com\/company\/airicom\/\",\"https:\/\/www.youtube.com\/channel\/UCcgCGMQdXFmPMTtJ_4bQQ6A\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.airicom.com\/blog\/#\/schema\/person\/9b03e2f4042442181fb95ef4ce971af7\",\"name\":\"Sarra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.airicom.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1fd692299a3c0016d5e0082cfcbb1c2faa52d40b6853e83ecf9531e23a7acf91?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1fd692299a3c0016d5e0082cfcbb1c2faa52d40b6853e83ecf9531e23a7acf91?s=96&d=mm&r=g\",\"caption\":\"Sarra\"},\"url\":\"https:\/\/www.airicom.com\/blog\/author\/sarram\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 OT : S\u00e9curiser l\u2019acc\u00e8s distant \u00e0 vos machines","description":"S\u00e9curisez vos acc\u00e8s distants avec Ewon. Guide complet sur la conformit\u00e9 NIS2, la norme IEC 62443 et l'accompagnement expert d'Airicom.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/","twitter_card":"summary_large_image","twitter_title":"Cybers\u00e9curit\u00e9 OT : S\u00e9curiser l\u2019acc\u00e8s distant \u00e0 vos machines","twitter_description":"S\u00e9curisez vos acc\u00e8s distants avec Ewon. Guide complet sur la conformit\u00e9 NIS2, la norme IEC 62443 et l'accompagnement expert d'Airicom.","twitter_image":"https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/05\/Cybersecurite-ot.jpg","twitter_creator":"@airicom3","twitter_site":"@airicom3","twitter_misc":{"\u00c9crit par":"Sarra","Dur\u00e9e de lecture estim\u00e9e":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/#article","isPartOf":{"@id":"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/"},"author":{"name":"Sarra","@id":"https:\/\/www.airicom.com\/blog\/#\/schema\/person\/9b03e2f4042442181fb95ef4ce971af7"},"headline":"Cybers\u00e9curit\u00e9 OT : S\u00e9curiser l\u2019acc\u00e8s distant \u00e0 vos machines","datePublished":"2026-05-04T08:51:39+00:00","dateModified":"2026-05-04T09:47:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/"},"wordCount":2015,"commentCount":0,"publisher":{"@id":"https:\/\/www.airicom.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/#primaryimage"},"thumbnailUrl":"https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/05\/Cybersecurite-ot.jpg","articleSection":["Cybers\u00e9curit\u00e9 OT","Ewon"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/","url":"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/","name":"Cybers\u00e9curit\u00e9 OT : S\u00e9curiser l\u2019acc\u00e8s distant \u00e0 vos machines","isPartOf":{"@id":"https:\/\/www.airicom.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/#primaryimage"},"image":{"@id":"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/#primaryimage"},"thumbnailUrl":"https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/05\/Cybersecurite-ot.jpg","datePublished":"2026-05-04T08:51:39+00:00","dateModified":"2026-05-04T09:47:02+00:00","description":"S\u00e9curisez vos acc\u00e8s distants avec Ewon. Guide complet sur la conformit\u00e9 NIS2, la norme IEC 62443 et l'accompagnement expert d'Airicom.","breadcrumb":{"@id":"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/#primaryimage","url":"https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/05\/Cybersecurite-ot.jpg","contentUrl":"https:\/\/www.airicom.com\/blog\/wp-content\/uploads\/2026\/05\/Cybersecurite-ot.jpg","width":1536,"height":864,"caption":"Cybers\u00e9curit\u00e9 OT"},{"@type":"BreadcrumbList","@id":"https:\/\/www.airicom.com\/blog\/cybersecurite-ot\/cybersecurite-ot-securiser-lacces-distant-a-vos-machines\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.airicom.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9 OT : S\u00e9curiser l\u2019acc\u00e8s distant \u00e0 vos machines"}]},{"@type":"WebSite","@id":"https:\/\/www.airicom.com\/blog\/#website","url":"https:\/\/www.airicom.com\/blog\/","name":"Airicom - Expert IoT et M2M depuis plus de 20 ans","description":"Airicom - Expert IoT et M2M depuis plus de 20 ans","publisher":{"@id":"https:\/\/www.airicom.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.airicom.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.airicom.com\/blog\/#organization","name":"Airicom - Expert IoT et M2M depuis plus de 20 ans","url":"https:\/\/www.airicom.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.airicom.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/airicom.com\/blog\/wp-content\/uploads\/2020\/04\/logo-airicom-2020-200.jpg","contentUrl":"https:\/\/airicom.com\/blog\/wp-content\/uploads\/2020\/04\/logo-airicom-2020-200.jpg","width":200,"height":37,"caption":"Airicom - Expert IoT et M2M depuis plus de 20 ans"},"image":{"@id":"https:\/\/www.airicom.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/airicom3","https:\/\/www.linkedin.com\/company\/airicom\/","https:\/\/www.youtube.com\/channel\/UCcgCGMQdXFmPMTtJ_4bQQ6A"]},{"@type":"Person","@id":"https:\/\/www.airicom.com\/blog\/#\/schema\/person\/9b03e2f4042442181fb95ef4ce971af7","name":"Sarra","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.airicom.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1fd692299a3c0016d5e0082cfcbb1c2faa52d40b6853e83ecf9531e23a7acf91?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1fd692299a3c0016d5e0082cfcbb1c2faa52d40b6853e83ecf9531e23a7acf91?s=96&d=mm&r=g","caption":"Sarra"},"url":"https:\/\/www.airicom.com\/blog\/author\/sarram\/"}]}},"_links":{"self":[{"href":"https:\/\/www.airicom.com\/blog\/wp-json\/wp\/v2\/posts\/34781","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.airicom.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.airicom.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.airicom.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.airicom.com\/blog\/wp-json\/wp\/v2\/comments?post=34781"}],"version-history":[{"count":23,"href":"https:\/\/www.airicom.com\/blog\/wp-json\/wp\/v2\/posts\/34781\/revisions"}],"predecessor-version":[{"id":34811,"href":"https:\/\/www.airicom.com\/blog\/wp-json\/wp\/v2\/posts\/34781\/revisions\/34811"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.airicom.com\/blog\/wp-json\/wp\/v2\/media\/34810"}],"wp:attachment":[{"href":"https:\/\/www.airicom.com\/blog\/wp-json\/wp\/v2\/media?parent=34781"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.airicom.com\/blog\/wp-json\/wp\/v2\/categories?post=34781"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.airicom.com\/blog\/wp-json\/wp\/v2\/tags?post=34781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}