{"id":2206,"date":"2019-11-24T16:25:32","date_gmt":"2019-11-24T15:25:32","guid":{"rendered":"https:\/\/digitalpwc.com\/?page_id=2206"},"modified":"2019-11-28T13:29:58","modified_gmt":"2019-11-28T12:29:58","slug":"logiciel-de-intervention-des-fuites-de-donnees","status":"publish","type":"page","link":"https:\/\/digitalpwc.com\/en\/logiciel-de-intervention-des-fuites-de-donnees\/","title":{"rendered":"data leakage intervention software"},"content":{"rendered":"<div class=\"vc_row wpb_row vc_row-fluid vc_custom_1526058512364 vc_row-has-fill\"><div class=\"wpb_column vc_column_container vc_col-sm-12 vc_col-lg-12 vc_col-md-12\"><div class=\"vc_column-inner vc_custom_1574462353186\"><div class=\"wpb_wrapper\"><div id=\"ultimate-heading-98126a0a8a3179e23\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-98126a0a8a3179e23 uvc-7699 accent-subtitle-color\" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-98126a0a8a3179e23 h2'  data-responsive-json-new='{\"font-size\":\"desktop:70px;mobile_landscape:30px;\",\"line-height\":\"desktop:80px;mobile_landscape:40px;\"}' ><h2 style=\"--font-weight:theme;color:#ffffff;\">Data Loss Prevention Software<\/h2><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-98126a0a8a3179e23 .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"desktop:40px;mobile_landscape:22px;\",\"line-height\":\"desktop:50px;mobile_landscape:32px;\"}'  style=\"font-family:&#039;Roboto&#039;;font-weight:normal;color:#ffffff;margin-top:10px;margin-bottom:15px;\">The solution you need at the best price<\/div><\/div><style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-00db12003357ae0e4179cdf7a22408b9.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-00db12003357ae0e4179cdf7a22408b9 > i {\n  margin-right: 8px;\n}\n<\/style><div class=\"btn-align-center\"><a href=\"https:\/\/digitalpwc.com\/en\/pricing\/\" class=\"default-btn-shortcode dt-btn dt-btn-l link-hover-off\" id=\"default-btn-00db12003357ae0e4179cdf7a22408b9\"><span>Try Now<\/span><\/a><\/div><\/div><\/div><\/div><\/div><!-- Row Backgrounds --><div class=\"upb_bg_img\" data-ultimate-bg=\"url(https:\/\/digitalpwc.com\/wp-content\/uploads\/2014\/03\/fancyblue.gif)\" data-image-id=\"id^1616|url^https:\/\/digitalpwc.com\/wp-content\/uploads\/2014\/03\/fancyblue.gif|caption^null|alt^null|title^fancyblue|description^null\" data-ultimate-bg-style=\"vcpb-vz-jquery\" data-bg-img-repeat=\"no-repeat\" data-bg-img-size=\"cover\" data-bg-img-position=\"\" data-parallx_sense=\"30\" data-bg-override=\"ex-full\" data-bg_img_attach=\"scroll\" data-upb-overlay-color=\"\" data-upb-bg-animation=\"\" data-fadeout=\"\" data-bg-animation=\"left-animation\" data-bg-animation-type=\"h\" data-animation-repeat=\"repeat\" data-fadeout-percentage=\"30\" data-parallax-content=\"\" data-parallax-content-sense=\"30\" data-row-effect-mobile-disable=\"true\" data-img-parallax-mobile-disable=\"true\" data-rtl=\"false\"  data-custom-vc-row=\"\"  data-vc=\"6.0.5\"  data-is_old_vc=\"\"  data-theme-support=\"\"   data-overlay=\"false\" data-overlay-color=\"\" data-overlay-pattern=\"\" data-overlay-pattern-opacity=\"\" data-overlay-pattern-size=\"\"    ><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1574463915571\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner vc_custom_1490278896841\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>The easiest DLP software on the market<\/h3>\n<p>&nbsp;<\/p>\n<p>Data loss affects one in four companies, and the average cost of a breach is $3.62 million. The good news? DiitalPWC detects these leaks and, unlike others, it works with ease.<\/p>\n<ul>\n<li>Detects data loss on corporate networks<\/li>\n<li>Detects all kinds of file manipulations<\/li>\n<li>Includes network packet inspection to detect malware<\/li>\n<li>Adapted to your budget - modular architecture (optional modules)<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6 vc_hidden-xs\"><div class=\"vc_column-inner vc_custom_1490279767331\"><div class=\"wpb_wrapper\"><style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.shortcode-single-image-wrap.shortcode-single-image-ad5ac131135ed4fc51222552712e862f.enable-bg-rollover .rollover i,\n.shortcode-single-image-wrap.shortcode-single-image-ad5ac131135ed4fc51222552712e862f.enable-bg-rollover .rollover-video i {\n  background: -webkit-linear-gradient();\n  background: linear-gradient();\n}\n.shortcode-single-image-wrap.shortcode-single-image-ad5ac131135ed4fc51222552712e862f .rollover-icon {\n  font-size: 32px;\n  color: #ffffff;\n  min-width: 44px;\n  min-height: 44px;\n  line-height: 44px;\n  border-radius: 100px;\n  border-style: solid;\n  border-width: 0px;\n}\n.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-ad5ac131135ed4fc51222552712e862f .rollover-icon {\n  background: rgba(255,255,255,0.3);\n  box-shadow: none;\n}\n<\/style><div class=\"shortcode-single-image-wrap shortcode-single-image-ad5ac131135ed4fc51222552712e862f alignnone  enable-bg-rollover dt-icon-bg-off\" style=\"margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; width:1200px;\"><div class=\"shortcode-single-image\"><div class=\"fancy-media-wrap  layzr-bg\" style=\"\"><img fetchpriority=\"high\" decoding=\"async\" class=\"preload-me lazy-load aspect\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%201200%20800&#39;%2F%3E\" data-src=\"https:\/\/digitalpwc.com\/wp-content\/uploads\/2014\/08\/a018.jpg\" data-srcset=\"https:\/\/digitalpwc.com\/wp-content\/uploads\/2014\/08\/a018.jpg 1200w\" loading=\"eager\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"800\"  data-dt-location=\"https:\/\/digitalpwc.com\/en\/comment-securiser-les-appareils-de-lentreprise-pc-mac-mobile-et-plus-encore\/a018\/\" style=\"--ratio: 1200 \/ 800;\" alt=\"\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1574437317675 vc_row-has-fill\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner vc_custom_1490278901277\"><div class=\"wpb_wrapper\"><style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.shortcode-single-image-wrap.shortcode-single-image-025eb77ce1c6d39bf8915baf9886a8c7.enable-bg-rollover .rollover i,\n.shortcode-single-image-wrap.shortcode-single-image-025eb77ce1c6d39bf8915baf9886a8c7.enable-bg-rollover .rollover-video i {\n  background: -webkit-linear-gradient();\n  background: linear-gradient();\n}\n.shortcode-single-image-wrap.shortcode-single-image-025eb77ce1c6d39bf8915baf9886a8c7 .rollover-icon {\n  font-size: 32px;\n  color: #ffffff;\n  min-width: 44px;\n  min-height: 44px;\n  line-height: 44px;\n  border-radius: 100px;\n  border-style: solid;\n  border-width: 0px;\n}\n.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-025eb77ce1c6d39bf8915baf9886a8c7 .rollover-icon {\n  background: rgba(255,255,255,0.3);\n  box-shadow: none;\n}\n<\/style><div class=\"shortcode-single-image-wrap shortcode-single-image-025eb77ce1c6d39bf8915baf9886a8c7 alignnone  enable-bg-rollover dt-icon-bg-off\" style=\"margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; width:1200px;\"><div class=\"shortcode-single-image\"><div class=\"fancy-media-wrap  layzr-bg\" style=\"\"><img decoding=\"async\" class=\"preload-me lazy-load aspect\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%201200%20800&#39;%2F%3E\" data-src=\"https:\/\/digitalpwc.com\/wp-content\/uploads\/2014\/03\/s001.jpg\" data-srcset=\"https:\/\/digitalpwc.com\/wp-content\/uploads\/2014\/03\/s001.jpg 1200w\" loading=\"eager\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"800\"  data-dt-location=\"https:\/\/digitalpwc.com\/en\/s001\/\" style=\"--ratio: 1200 \/ 800;\" alt=\"\" \/><\/div><\/div><\/div><div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner vc_custom_1490278896841\"><div class=\"wpb_wrapper\"><div class=\"dt-fancy-separator h3-size accent-title-color\" style=\"width: 100%;\"><div class=\"dt-fancy-title\"><span class=\"separator-holder separator-left\"><\/span>THE PROBLEM!<span class=\"separator-holder separator-right\"><\/span><\/div><\/div><div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>If you're responsible for your company's IT security, these questions probably keep you up at night:<\/p>\n<ul>\n<li>How can I comply with the GDPR?<\/li>\n<li>What is the best data loss prevention strategy?<\/li>\n<li>How can I secure all my devices, including mobile?\"<\/li>\n<\/ul>\n<p>DigitalPWC helps answer these questions - but without all the complexity, obligations and obtuse vocabulary associated with existing solutions. DigitalPWC is a hardware-free Cloud SAS system designed by people who truly understand the threats of data loss, offering you pragmatic solutions at a lower cost.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><!-- Row Backgrounds --><div class=\"upb_bg_img\" data-ultimate-bg=\"url(https:\/\/digitalpwc.com\/wp-content\/uploads\/2014\/03\/skin05r.stripes-stripe-1-bg-image.gif)\" data-image-id=\"id^1690|url^https:\/\/digitalpwc.com\/wp-content\/uploads\/2014\/03\/skin05r.stripes-stripe-1-bg-image.gif|caption^null|alt^null|title^skin05r.stripes-stripe-1-bg-image|description^null\" data-ultimate-bg-style=\"vcpb-default\" data-bg-img-repeat=\"repeat\" data-bg-img-size=\"initial\" data-bg-img-position=\"\" data-parallx_sense=\"30\" data-bg-override=\"ex-full\" data-bg_img_attach=\"scroll\" data-upb-overlay-color=\"\" data-upb-bg-animation=\"\" data-fadeout=\"\" data-bg-animation=\"left-animation\" data-bg-animation-type=\"h\" data-animation-repeat=\"repeat\" data-fadeout-percentage=\"30\" data-parallax-content=\"\" data-parallax-content-sense=\"30\" data-row-effect-mobile-disable=\"true\" data-img-parallax-mobile-disable=\"true\" data-rtl=\"false\"  data-custom-vc-row=\"\"  data-vc=\"6.0.5\"  data-is_old_vc=\"\"  data-theme-support=\"\"   data-overlay=\"false\" data-overlay-color=\"\" data-overlay-pattern=\"\" data-overlay-pattern-opacity=\"\" data-overlay-pattern-size=\"\"    ><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1574462091277 vc_row-o-content-middle vc_row-flex\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner vc_custom_1490278896841\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h2 class=\"txt-white\" style=\"text-align: center;\"><span style=\"color: #ffffff;\">Implement your data loss prevention strategy today.<\/span><\/h2>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><div class=\"vc_btn3-container  sg-popup-id-2124 vc_btn3-center\" ><button class=\"vc_general vc_btn3 vc_btn3-size-lg vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-icon-left vc_btn3-color-danger\"><i class=\"vc_btn3-icon fa fa-cart-arrow-down\"><\/i> Start a 14-day free trial<\/button><\/div><\/div><\/div><\/div><\/div><!-- Row Backgrounds --><div class=\"upb_color\" data-bg-override=\"ex-full\" data-bg-color=\"#000000\" data-fadeout=\"\" data-fadeout-percentage=\"30\" data-parallax-content=\"\" data-parallax-content-sense=\"30\" data-row-effect-mobile-disable=\"true\" data-img-parallax-mobile-disable=\"true\" data-rtl=\"false\"  data-custom-vc-row=\"\"  data-vc=\"6.0.5\"  data-is_old_vc=\"\"  data-theme-support=\"\"   data-overlay=\"false\" data-overlay-color=\"\" data-overlay-pattern=\"\" data-overlay-pattern-opacity=\"\" data-overlay-pattern-size=\"\"    ><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1490279366357 vc_row-has-fill vc_row-o-content-middle vc_row-flex\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner vc_custom_1490278901277\"><div class=\"wpb_wrapper\"><div class=\"dt-fancy-separator h2-size accent-title-color\" style=\"width: 100%;\"><div class=\"dt-fancy-title\"><span class=\"separator-holder separator-left\"><\/span>DigitalPWC Data Loss Prevention Software Overview<span class=\"separator-holder separator-right\"><\/span><\/div><\/div><div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p class=\"txt-center\" style=\"text-align: center;\">Data loss occurs when end users send critical data or information outside the corporate network.<br \/>\nDigitalPWC provides the tools necessary to detect data loss and allows organizations to easily create data loss prevention strategies.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"smile_icon_list_wrap ult_info_list_container ult-adjust-bottom-margin\"><ul class=\"smile_icon_list left circle with_bg\"><li class=\"icon_list_item\" style=\" font-size:72px;\"><div class=\"icon_list_icon\" data-animation=\"\" data-animation-delay=\"03\" style=\"font-size:24px;border-width:1px;border-style:none;background:#f7f7f7;color:#1e73be;border-color:#333333;\"><i class=\"fas fa-file-export\" ><\/i><\/div><div class=\"icon_description\" id=\"Info-list-wrap-9722\" style=\"font-size:24px;\"><h3 class=\"ult-responsive info-list-heading\"  data-ultimate-target='#Info-list-wrap-9722 h3'  data-responsive-json-new='{\"font-size\":\"desktop:16px;\",\"line-height\":\"desktop:24px;\"}'  style=\"\">Tracking of all file movements<\/h3><div class=\"icon_description_text ult-responsive\"  data-ultimate-target='#Info-list-wrap-9722 .icon_description_text'  data-responsive-json-new='{\"font-size\":\"desktop:13px;\",\"line-height\":\"desktop:18px;\"}'  style=\"\"><p>Install DigitalPWC data loss prevention software and instantly discover, monitor and protect against all forms of data breaches and internal theft. DigitalPWC tracks file movements within the corporate network as well as transfers to cloud services, web-mail, USB, IM chats, etc.<\/p>\n<\/div><\/div><div class=\"icon_list_connector\"  style=\"border-right-width: 1px;border-right-style: dashed;border-color: #333333;\"><\/div><\/li><li class=\"icon_list_item\" style=\" font-size:72px;\"><div class=\"icon_list_icon\" data-animation=\"\" data-animation-delay=\"03\" style=\"font-size:24px;border-width:1px;border-style:none;background:#f7f7f7;color:#1e73be;border-color:#333333;\"><i class=\"fas fa-pencil-ruler\" ><\/i><\/div><div class=\"icon_description\" id=\"Info-list-wrap-1376\" style=\"font-size:24px;\"><h3 class=\"ult-responsive info-list-heading\"  data-ultimate-target='#Info-list-wrap-1376 h3'  data-responsive-json-new='{\"font-size\":\"desktop:16px;\",\"line-height\":\"desktop:24px;\"}'  style=\"\">Tracking of all file changes<\/h3><div class=\"icon_description_text ult-responsive\"  data-ultimate-target='#Info-list-wrap-1376 .icon_description_text'  data-responsive-json-new='{\"font-size\":\"desktop:13px;\",\"line-height\":\"desktop:18px;\"}'  style=\"\"><p>File changes such as creating, deleting, renaming or merging are also detected. DigitalPWC can even tell you when protected files are added to a zip file, allowing you to counter more sophisticated threats.<\/p>\n<\/div><\/div><div class=\"icon_list_connector\"  style=\"border-right-width: 1px;border-right-style: dashed;border-color: #333333;\"><\/div><\/li><li class=\"icon_list_item\" style=\" font-size:72px;\"><div class=\"icon_list_icon\" data-animation=\"\" data-animation-delay=\"03\" style=\"font-size:24px;border-width:1px;border-style:none;background:#f7f7f7;color:#1e73be;border-color:#333333;\"><i class=\"icomoon-icomoonfree-16x16-finder\" ><\/i><\/div><div class=\"icon_description\" id=\"Info-list-wrap-1995\" style=\"font-size:24px;\"><h3 class=\"ult-responsive info-list-heading\"  data-ultimate-target='#Info-list-wrap-1995 h3'  data-responsive-json-new='{\"font-size\":\"desktop:16px;\",\"line-height\":\"desktop:24px;\"}'  style=\"\">Detecting malicious code<\/h3><div class=\"icon_description_text ult-responsive\"  data-ultimate-target='#Info-list-wrap-1995 .icon_description_text'  data-responsive-json-new='{\"font-size\":\"desktop:13px;\",\"line-height\":\"desktop:18px;\"}'  style=\"\"><p>Unlike other products, DigitalPWC also inspects network packets for suspicious port activity, email bots, DDOS zombies and other hidden malware.<\/p>\n<\/div><\/div><div class=\"icon_list_connector\"  style=\"border-right-width: 1px;border-right-style: dashed;border-color: #333333;\"><\/div><\/li><li class=\"icon_list_item\" style=\" font-size:72px;\"><div class=\"icon_list_icon\" data-animation=\"\" data-animation-delay=\"03\" style=\"font-size:24px;border-width:1px;border-style:none;background:#f7f7f7;color:#1e73be;border-color:#333333;\"><i class=\"fas fa-puzzle-piece\" ><\/i><\/div><div class=\"icon_description\" id=\"Info-list-wrap-2161\" style=\"font-size:24px;\"><h3 class=\"ult-responsive info-list-heading\"  data-ultimate-target='#Info-list-wrap-2161 h3'  data-responsive-json-new='{\"font-size\":\"desktop:16px;\",\"line-height\":\"desktop:24px;\"}'  style=\"\">Optional modules - buy only what you need<\/h3><div class=\"icon_description_text ult-responsive\"  data-ultimate-target='#Info-list-wrap-2161 .icon_description_text'  data-responsive-json-new='{\"font-size\":\"desktop:13px;\",\"line-height\":\"desktop:18px;\"}'  style=\"\"><p>While some data loss can be detected through file monitoring, the most effective form of data loss prevention is to proactively identify internal threats. DigitalPWC's optional monitoring modules allow you to extend your data loss prevention strategy to include analysis of employee behavior such as application and Internet usage, time management, productivity analysis and much more.<\/p>\n<\/div><\/div><div class=\"icon_list_connector\"  style=\"border-right-width: 1px;border-right-style: dashed;border-color: #333333;\"><\/div><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><!-- Row Backgrounds --><div class=\"upb_bg_img\" data-ultimate-bg=\"url(https:\/\/digitalpwc.com\/wp-content\/uploads\/2014\/03\/skin05r.stripes-stripe-1-bg-image.gif)\" data-image-id=\"id^1690|url^https:\/\/digitalpwc.com\/wp-content\/uploads\/2014\/03\/skin05r.stripes-stripe-1-bg-image.gif|caption^null|alt^null|title^skin05r.stripes-stripe-1-bg-image|description^null\" data-ultimate-bg-style=\"vcpb-default\" data-bg-img-repeat=\"repeat\" data-bg-img-size=\"initial\" data-bg-img-position=\"\" data-parallx_sense=\"30\" data-bg-override=\"ex-full\" data-bg_img_attach=\"scroll\" data-upb-overlay-color=\"\" data-upb-bg-animation=\"\" data-fadeout=\"\" data-bg-animation=\"left-animation\" data-bg-animation-type=\"h\" data-animation-repeat=\"repeat\" data-fadeout-percentage=\"30\" data-parallax-content=\"\" data-parallax-content-sense=\"30\" data-row-effect-mobile-disable=\"true\" data-img-parallax-mobile-disable=\"true\" data-rtl=\"false\"  data-custom-vc-row=\"\"  data-vc=\"6.0.5\"  data-is_old_vc=\"\"  data-theme-support=\"\"   data-overlay=\"false\" data-overlay-color=\"\" data-overlay-pattern=\"\" data-overlay-pattern-opacity=\"\" data-overlay-pattern-size=\"\"    ><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1574716326017 vc_row-has-fill\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner vc_custom_1490278901277\"><div class=\"wpb_wrapper\"><div class=\"dt-fancy-separator h2-size accent-title-color\" style=\"width: 100%;\"><div class=\"dt-fancy-title\"><span class=\"separator-holder separator-left\"><\/span>DigitalPWC DLP Module Features<span class=\"separator-holder separator-right\"><\/span><\/div><\/div><div class=\"vc_empty_space\"   style=\"height: 60px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"aio-icon-component    style_1\"><div id=\"Info-box-wrap-3691\" class=\"aio-icon-box default-icon\" style=\"\"  ><div class=\"aio-icon-default\"><div class=\"ult-just-icon-wrapper\"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none\"  style=\"color:#333;font-size:32px;display:inline-block;\">\n\t<i class=\"fas fa-file-export\"><\/i>\n<\/div><\/div><\/div><\/div><div class=\"aio-icon-header\" ><h3 class=\"aio-icon-title ult-responsive\"  data-ultimate-target='#Info-box-wrap-3691 .aio-icon-title'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:bold;\">File transfers and modifications<\/h3><\/div> <!-- header --><div class=\"aio-icon-description ult-responsive\"  data-ultimate-target='#Info-box-wrap-3691 .aio-icon-description'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\"><strong>Resigned employee ? Will he take your source code with him?<\/strong><\/p>\n<p>Be notified when files are renamed or deleted, printed, copied to USB devices, downloaded via FTP and cloud, sent via Gmail, Hotmail, Yahoo.<\/div> <!-- description --><\/div> <!-- aio-icon-box --><\/div> <!-- aio-icon-component --><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"aio-icon-component    style_1\"><div id=\"Info-box-wrap-3903\" class=\"aio-icon-box default-icon\" style=\"\"  ><div class=\"aio-icon-default\"><div class=\"ult-just-icon-wrapper\"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none\"  style=\"color:#333;font-size:32px;display:inline-block;\">\n\t<i class=\"icomoon-material-24x24-apps\"><\/i>\n<\/div><\/div><\/div><\/div><div class=\"aio-icon-header\" ><h3 class=\"aio-icon-title ult-responsive\"  data-ultimate-target='#Info-box-wrap-3903 .aio-icon-title'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:bold;\">Detecting network threats<\/h3><\/div> <!-- header --><div class=\"aio-icon-description ult-responsive\"  data-ultimate-target='#Info-box-wrap-3903 .aio-icon-description'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\"><strong>Be aware of any suspicious activity on the network.<\/strong><\/p>\n<p>DigitalPWC is the only software that offers both application-level and packet-level scanning. Be alerted to suspicious port activity, spam bots, DDOS zombies and all other malware.<\/p>\n<p><\/div> <!-- description --><\/div> <!-- aio-icon-box --><\/div> <!-- aio-icon-component --><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"aio-icon-component    style_1\"><div id=\"Info-box-wrap-5555\" class=\"aio-icon-box default-icon\" style=\"\"  ><div class=\"aio-icon-default\"><div class=\"ult-just-icon-wrapper\"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none\"  style=\"color:#333;font-size:32px;display:inline-block;\">\n\t<i class=\"icomoon-material-24x24-touch_app\"><\/i>\n<\/div><\/div><\/div><\/div><div class=\"aio-icon-header\" ><h3 class=\"aio-icon-title ult-responsive\"  data-ultimate-target='#Info-box-wrap-5555 .aio-icon-title'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:bold;\">Application monitoring<\/h3><\/div> <!-- header --><div class=\"aio-icon-description ult-responsive\"  data-ultimate-target='#Info-box-wrap-5555 .aio-icon-description'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\"><strong>What applications are installed on your network?<\/strong><\/p>\n<p>Understand how and when your employees use instant messaging, webmail, websites, business applications, including keyboarding, using a browser connected to the Internet.<\/div> <!-- description --><\/div> <!-- aio-icon-box --><\/div> <!-- aio-icon-component --><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"aio-icon-component    style_1\"><div id=\"Info-box-wrap-6343\" class=\"aio-icon-box default-icon\" style=\"\"  ><div class=\"aio-icon-default\"><div class=\"ult-just-icon-wrapper\"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none\"  style=\"color:#333;font-size:32px;display:inline-block;\">\n\t<i class=\"fas fa-database\"><\/i>\n<\/div><\/div><\/div><\/div><div class=\"aio-icon-header\" ><h3 class=\"aio-icon-title ult-responsive\"  data-ultimate-target='#Info-box-wrap-6343 .aio-icon-title'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:bold;\">Alerts and reports<\/h3><\/div> <!-- header --><div class=\"aio-icon-description ult-responsive\"  data-ultimate-target='#Info-box-wrap-6343 .aio-icon-description'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\"><strong>Information where and when you need it<\/strong><\/p>\n<p>Receive alerts and reports on suspicious file transfers, network protocols, banned websites or excessive bandwidth usage, low traffic or low productivity. Reports can be sent directly to employees for self-improvement.<\/div> <!-- description --><\/div> <!-- aio-icon-box --><\/div> <!-- aio-icon-component --><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"aio-icon-component    style_1\"><div id=\"Info-box-wrap-3894\" class=\"aio-icon-box default-icon\" style=\"\"  ><div class=\"aio-icon-default\"><div class=\"ult-just-icon-wrapper\"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none\"  style=\"color:#333;font-size:32px;display:inline-block;\">\n\t<i class=\"icomoon-the7-font-the7-social-04\"><\/i>\n<\/div><\/div><\/div><\/div><div class=\"aio-icon-header\" ><h3 class=\"aio-icon-title ult-responsive\"  data-ultimate-target='#Info-box-wrap-3894 .aio-icon-title'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:bold;\">Unparalleled coverage<\/h3><\/div> <!-- header --><div class=\"aio-icon-description ult-responsive\"  data-ultimate-target='#Info-box-wrap-3894 .aio-icon-description'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\"><strong>Covers a very large part of your devices and activities<br \/>\n<\/strong><\/p>\n<p>DigitalPWC runs on PC, Mac, iPhone, iPad, Android and Tablets and you can easily transfer your licenses from one device to another, giving you the flexibility to include more staff.<\/p>\n<p><\/div> <!-- description --><\/div> <!-- aio-icon-box --><\/div> <!-- aio-icon-component --><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"aio-icon-component    style_1\"><div id=\"Info-box-wrap-6487\" class=\"aio-icon-box default-icon\" style=\"\"  ><div class=\"aio-icon-default\"><div class=\"ult-just-icon-wrapper\"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none\"  style=\"color:#333;font-size:32px;display:inline-block;\">\n\t<i class=\"Defaults-cubes\"><\/i>\n<\/div><\/div><\/div><\/div><div class=\"aio-icon-header\" ><h3 class=\"aio-icon-title ult-responsive\"  data-ultimate-target='#Info-box-wrap-6487 .aio-icon-title'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:bold;\">Customized service<\/h3><\/div> <!-- header --><div class=\"aio-icon-description ult-responsive\"  data-ultimate-target='#Info-box-wrap-6487 .aio-icon-description'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\"><strong>Customized software<\/strong><\/p>\n<p>With our feature-rich solution, it's unlikely that DigitalPWC won't work for your business. However, if you need something special, we can customize DigitalPWC for you.<\/p>\n<p><\/div> <!-- description --><\/div> <!-- aio-icon-box --><\/div> <!-- aio-icon-component --><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"aio-icon-component    style_1\"><div id=\"Info-box-wrap-6579\" class=\"aio-icon-box default-icon\" style=\"\"  ><div class=\"aio-icon-default\"><div class=\"ult-just-icon-wrapper\"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none\"  style=\"color:#333;font-size:32px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div><\/div><div class=\"aio-icon-header\" ><h3 class=\"aio-icon-title ult-responsive\"  data-ultimate-target='#Info-box-wrap-6579 .aio-icon-title'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:bold;\">Instant power<\/h3><\/div> <!-- header --><div class=\"aio-icon-description ult-responsive\"  data-ultimate-target='#Info-box-wrap-6579 .aio-icon-description'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\"><\/p>\n<div class=\"kf-list\"><strong>Ready to use in minutes<\/strong><\/div>\n<div class=\"kf-list\">DigitalPWC can be set up in minutes. No need to buy and maintain servers, no need to train your IT person to use the most feature-rich employee monitoring available.<\/div>\n<p><\/div> <!-- description --><\/div> <!-- aio-icon-box --><\/div> <!-- aio-icon-component --><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><!-- Row Backgrounds --><div class=\"upb_color\" data-bg-override=\"full\" data-bg-color=\"#ffffff\" data-fadeout=\"\" data-fadeout-percentage=\"30\" data-parallax-content=\"\" data-parallax-content-sense=\"30\" data-row-effect-mobile-disable=\"true\" data-img-parallax-mobile-disable=\"true\" data-rtl=\"false\"  data-custom-vc-row=\"\"  data-vc=\"6.0.5\"  data-is_old_vc=\"\"  data-theme-support=\"\"   data-overlay=\"false\" data-overlay-color=\"\" data-overlay-pattern=\"\" data-overlay-pattern-opacity=\"\" data-overlay-pattern-size=\"\"    ><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"dt-fancy-separator h1-size accent-title-color\" style=\"width: 100%;\"><div class=\"dt-fancy-title\"><span class=\"separator-holder separator-left\"><\/span>Why choose DigitalPWC?<span class=\"separator-holder separator-right\"><\/span><\/div><\/div><div class=\"vc_empty_space\"   style=\"height: 60px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2173 aligncenter\" src=\"https:\/\/digitalpwc.com\/wp-content\/uploads\/2019\/11\/cyber-security-300x213.jpg\" alt=\"\" width=\"300\" height=\"213\" srcset=\"https:\/\/digitalpwc.com\/wp-content\/uploads\/2019\/11\/cyber-security-300x213.jpg 300w, https:\/\/digitalpwc.com\/wp-content\/uploads\/2019\/11\/cyber-security-600x425.jpg 600w, https:\/\/digitalpwc.com\/wp-content\/uploads\/2019\/11\/cyber-security-1024x726.jpg 1024w, https:\/\/digitalpwc.com\/wp-content\/uploads\/2019\/11\/cyber-security-768x544.jpg 768w, https:\/\/digitalpwc.com\/wp-content\/uploads\/2019\/11\/cyber-security-1536x1089.jpg 1536w, https:\/\/digitalpwc.com\/wp-content\/uploads\/2019\/11\/cyber-security-2048x1452.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>DigitalPWC was born out of our own frustration in our search for an effective DLP solution - from the requirement for expensive hardware, the need for extensive IT training, and the incessant calls from pushy vendors - existing solutions were unsatisfactory compromises to real-world problems.<\/p>\n<p>DigitalPWC eliminates this frustration because unlike others, DigitalPWC:<\/p>\n<ul>\n<li>Is easy to use because we are cloud based<\/li>\n<li>Works on more devices - PC, Mac, Android and iPhone<\/li>\n<li>Provides combined application and network packet monitoring<\/li>\n<li>Provides modules - buy only what you need and upgrade when you need it.<\/li>\n<li>Offers customization services to create the perfect solution<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Data Loss Prevention SoftwareThe solution you need at the best price The easiest DLP software on the market Data loss affects one in four businesses, and the average cost of a breach is $3.62 million. The good news? DiitalPWC detects these leaks and, unlike...<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2206","page","type-page","status-publish","hentry","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>logiciel de intervention des fuites de donn\u00e9es - DigitalPWC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digitalpwc.com\/en\/logiciel-de-intervention-des-fuites-de-donnees\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"logiciel de intervention des fuites de donn\u00e9es - DigitalPWC\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digitalpwc.com\/en\/logiciel-de-intervention-des-fuites-de-donnees\/\" \/>\n<meta property=\"og:site_name\" content=\"DigitalPWC\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-28T12:29:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digitalpwc.com\/wp-content\/uploads\/2019\/11\/cyber-security-300x213.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/logiciel-de-intervention-des-fuites-de-donnees\\\/\",\"url\":\"https:\\\/\\\/digitalpwc.com\\\/logiciel-de-intervention-des-fuites-de-donnees\\\/\",\"name\":\"logiciel de intervention des fuites de donn\u00e9es - DigitalPWC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/logiciel-de-intervention-des-fuites-de-donnees\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/logiciel-de-intervention-des-fuites-de-donnees\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalpwc.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/cyber-security-300x213.jpg\",\"datePublished\":\"2019-11-24T15:25:32+00:00\",\"dateModified\":\"2019-11-28T12:29:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/logiciel-de-intervention-des-fuites-de-donnees\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/digitalpwc.com\\\/logiciel-de-intervention-des-fuites-de-donnees\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/logiciel-de-intervention-des-fuites-de-donnees\\\/#primaryimage\",\"url\":\"https:\\\/\\\/digitalpwc.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/cyber-security-300x213.jpg\",\"contentUrl\":\"https:\\\/\\\/digitalpwc.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/cyber-security-300x213.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/logiciel-de-intervention-des-fuites-de-donnees\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/digitalpwc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"logiciel de intervention des fuites de donn\u00e9es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digitalpwc.com\\\/#website\",\"url\":\"https:\\\/\\\/digitalpwc.com\\\/\",\"name\":\"DigitalPWC\",\"description\":\"DIGITAL POWER CONTROL - SECURITY SOLUTIONS FOR DIGITAL WORD\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digitalpwc.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"data leakage intervention software - DigitalPWC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digitalpwc.com\/en\/logiciel-de-intervention-des-fuites-de-donnees\/","og_locale":"en_US","og_type":"article","og_title":"logiciel de intervention des fuites de donn\u00e9es - DigitalPWC","og_url":"https:\/\/digitalpwc.com\/en\/logiciel-de-intervention-des-fuites-de-donnees\/","og_site_name":"DigitalPWC","article_modified_time":"2019-11-28T12:29:58+00:00","og_image":[{"url":"https:\/\/digitalpwc.com\/wp-content\/uploads\/2019\/11\/cyber-security-300x213.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/digitalpwc.com\/logiciel-de-intervention-des-fuites-de-donnees\/","url":"https:\/\/digitalpwc.com\/logiciel-de-intervention-des-fuites-de-donnees\/","name":"data leakage intervention software - DigitalPWC","isPartOf":{"@id":"https:\/\/digitalpwc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digitalpwc.com\/logiciel-de-intervention-des-fuites-de-donnees\/#primaryimage"},"image":{"@id":"https:\/\/digitalpwc.com\/logiciel-de-intervention-des-fuites-de-donnees\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalpwc.com\/wp-content\/uploads\/2019\/11\/cyber-security-300x213.jpg","datePublished":"2019-11-24T15:25:32+00:00","dateModified":"2019-11-28T12:29:58+00:00","breadcrumb":{"@id":"https:\/\/digitalpwc.com\/logiciel-de-intervention-des-fuites-de-donnees\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digitalpwc.com\/logiciel-de-intervention-des-fuites-de-donnees\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalpwc.com\/logiciel-de-intervention-des-fuites-de-donnees\/#primaryimage","url":"https:\/\/digitalpwc.com\/wp-content\/uploads\/2019\/11\/cyber-security-300x213.jpg","contentUrl":"https:\/\/digitalpwc.com\/wp-content\/uploads\/2019\/11\/cyber-security-300x213.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/digitalpwc.com\/logiciel-de-intervention-des-fuites-de-donnees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/digitalpwc.com\/"},{"@type":"ListItem","position":2,"name":"logiciel de intervention des fuites de donn\u00e9es"}]},{"@type":"WebSite","@id":"https:\/\/digitalpwc.com\/#website","url":"https:\/\/digitalpwc.com\/","name":"DigitalPWC","description":"DIGITAL POWER CONTROL - SECURITY SOLUTIONS FOR DIGITAL WORD","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digitalpwc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/pages\/2206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/comments?post=2206"}],"version-history":[{"count":15,"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/pages\/2206\/revisions"}],"predecessor-version":[{"id":2294,"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/pages\/2206\/revisions\/2294"}],"wp:attachment":[{"href":"https:\/\/digitalpwc.com\/en\/wp-json\/wp\/v2\/media?parent=2206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}