{"id":11923,"date":"2022-06-07T04:40:18","date_gmt":"2022-06-07T08:40:18","guid":{"rendered":"https:\/\/diabsolut.com\/?p=11923"},"modified":"2026-03-10T15:58:55","modified_gmt":"2026-03-10T19:58:55","slug":"securite-et-impact-de-click-8-3","status":"publish","type":"post","link":"https:\/\/diabsolut.com\/fr\/securite-et-impact-de-click-8-3\/","title":{"rendered":"Faits saillants : s\u00e9curit\u00e9 de la solution et impact de la fin de vie de Click 8.3"},"content":{"rendered":"<h1>Faits saillants\u00a0: s\u00e9curit\u00e9 de la solution et impact de la fin de vie de Click\u00a08.3<\/h1>\n<h6><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-11921\" src=\"https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog-300x200.jpg\" alt=\"click salesforce security blog diabsolut solution s\u00e9curit\u00e9\" width=\"510\" height=\"340\" srcset=\"https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog-300x200.jpg 300w, https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog-550x367.jpg 550w, https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog-175x117.jpg 175w, https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog-140x93.jpg 140w, https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog-500x333.jpg 500w, https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog-225x150.jpg 225w, https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog-450x300.jpg 450w, https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog-200x133.jpg 200w, https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog-170x113.jpg 170w, https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog-263x175.jpg 263w, https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog-60x40.jpg 60w, https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog.jpg 600w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/>Auteur: Stephen Sugumar<\/h6>\n<p>Si vous \u00eates un utilisateur de Click 8.3 ou que vous \u00eates curieux de conna\u00eetre la fin de vie et les mesures de s\u00e9curit\u00e9 des solutions, voici quelques faits et ressources plus approfondies qui vous aideront \u00e0 rester \u00e0 jour et en s\u00e9curit\u00e9 avec votre solution.<\/p>\n<h4><strong>Fin de vie et s\u00e9curit\u00e9<\/strong><\/h4>\n<p><strong>Fait en bref<\/strong>\u00a0: une fois qu&rsquo;une partie d&rsquo;une solution a atteint la fin de vie, \u00e0 moins que quelque chose ne soit fait, cela cr\u00e9e une fen\u00eatre de vuln\u00e9rabilit\u00e9 qui met en danger les donn\u00e9es et les syst\u00e8mes de votre entreprise. La meilleure pratique consiste \u00e0 se pr\u00e9parer \u00e0 l&rsquo;avance pour la fin de vie afin d&rsquo;\u00e9viter toute interruption ou violation de donn\u00e9es.<\/p>\n<p>Les dates EOL (end-of-life) sont quelque chose que tout le monde a rencontr\u00e9 dans sa vie \u00e0 un moment ou \u00e0 un autre, <a href=\"https:\/\/diabsolut.com\/fr\/click-8-3-migration-guide\/?lang=fr\" target=\"_blank\" rel=\"noopener\">mais pour les utilisateurs de Click 8.3, EOL est un probl\u00e8me tr\u00e8s urgent<\/a>. Les dates de fin de vie des services sur le terrain ou des solutions organisationnelles mettent en danger les donn\u00e9es, les informations client et les op\u00e9rations de toute l&rsquo;organisation si elles ne sont pas correctement trait\u00e9es.<\/p>\n<p>Lorsque nous disons qu&rsquo;une application, une plateforme ou un syst\u00e8me approche ou a atteint sa date de fin de vie, c&rsquo;est la date \u00e0 laquelle il ne recevra plus de mises \u00e0 jour ou d&rsquo;assistance du fournisseur.<\/p>\n<ul>\n<li>Sans les mises \u00e0 jour du fournisseur, une organisation est responsable de l&rsquo;att\u00e9nuation de ses propres risques de s\u00e9curit\u00e9.<\/li>\n<li>De m\u00eame, sans l&rsquo;assistance d&rsquo;un fournisseur, une organisation sera responsable de la r\u00e9solution de tout probl\u00e8me pouvant survenir avec ou en raison d&rsquo;une application, d&rsquo;une plateforme ou d&rsquo;un syst\u00e8me non pris en charge.<\/li>\n<\/ul>\n<p>Les attaques de cyber s\u00e9curit\u00e9 sont la menace la plus \u00e9vidente.<\/p>\n<ul>\n<li>Toute application, plateforme ou syst\u00e8me ayant atteint la fin de vie cr\u00e9e un point d&rsquo;entr\u00e9e non s\u00e9curis\u00e9 pour les logiciels malveillants.\n<ul>\n<li>M\u00eame si le syst\u00e8me non pris en charge lui-m\u00eame n&rsquo;est pas infect\u00e9, il peut servir de passerelle pour des \u00e9l\u00e9ments tels que la surveillance des bogues et des logiciels espions.<\/li>\n<\/ul>\n<\/li>\n<li>L&rsquo;\u00e9quipe informatique d&rsquo;une entreprise aura besoin d&rsquo;efforts proactifs et r\u00e9actifs suppl\u00e9mentaires pour s&rsquo;assurer que les donn\u00e9es restent s\u00e9curis\u00e9es.<\/li>\n<\/ul>\n<h4><strong>Risques d&rsquo;incompatibilit\u00e9 des composants<\/strong><\/h4>\n<p><strong>Fait en bref<\/strong>\u00a0: les risques de s\u00e9curit\u00e9 et de fonctionnalit\u00e9 augmenteront avec le temps, car le composant qui a atteint la fin de vie devient de plus en plus obsol\u00e8te.<\/p>\n<ul>\n<li>Lorsqu&rsquo;une partie d&rsquo;une solution a atteint sa date de fin de vie, cela ne signifie pas que la totalit\u00e9 de la solution n&rsquo;est pas prise en charge.\n<ul>\n<li>Les composants qui sont toujours pris en charge continueront d&rsquo;avoir besoin de mises \u00e0 jour pour fonctionner correctement.<\/li>\n<li>Ces composants deviendront rapidement incompatibles avec le composant qui a atteint la fin de vie.<\/li>\n<\/ul>\n<\/li>\n<li>Cela signifie que la solution dans son ensemble n\u00e9cessitera de plus en plus de ressources pour continuer \u00e0 fonctionner comme pr\u00e9vu, et est plus susceptible de rencontrer des probl\u00e8mes inattendus (et non test\u00e9s) pouvant entra\u00eener des temps d&rsquo;arr\u00eat ou des risques de s\u00e9curit\u00e9.<\/li>\n<\/ul>\n<h4><strong>S\u00e9curit\u00e9 des solutions<\/strong><\/h4>\n<p><strong>Fait en bref<\/strong> : des \u00e9tapes suppl\u00e9mentaires simples comme l&rsquo;authentification multifactorielle (MFA) peuvent rendre une solution de service sur le terrain plus s\u00e9curis\u00e9e. Si vous optez pour un syst\u00e8me ou une plateforme de gestion de service sur le terrain s\u00e9curis\u00e9, assurez-vous que le fournisseur est transparent avec ses certifications et ses informations de s\u00e9curit\u00e9.<\/p>\n<p>Les attaques des logiciels de ran\u00e7on ont une fois de plus fait <a href=\"https:\/\/apnews.com\/article\/russia-ukraine-technology-business-gangs-costa-rica-9b2fe3c5a1fba7aa7010eade96a086ea\" target=\"_blank\" rel=\"noopener\">la une des journaux<\/a> ces derniers temps. Si un secteur de votre organisation est touch\u00e9 par une attaque de cybers\u00e9curit\u00e9 r\u00e9ussie, cela aura un impact n\u00e9gatif sur la fa\u00e7on dont les clients per\u00e7oivent votre entreprise.<\/p>\n<p>L&rsquo;un des principaux avantages d&rsquo;utilisation d&rsquo;une solution de service sur le terrain bas\u00e9 sur le cloud, outre le co\u00fbt de possession nettement inf\u00e9rieur, est \u00e9galement l&rsquo;un des principaux sujets de pr\u00e9occupation pour les personnes qui cherchent \u00e0 passer des solutions sur site aux solutions cloud\u00a0:<\/p>\n<ul>\n<li>Un fournisseur partage la responsabilit\u00e9 de la s\u00e9curit\u00e9 des informations de votre organisation.<\/li>\n<\/ul>\n<p>C\u2019est en choisissant le bon fournisseur que vous vous assurerez de tourner cette pr\u00e9occupation possible en avantage concurrentiel significatif.<\/p>\n<p>La s\u00e9curit\u00e9 des fournisseurs et des solutions est un sujet tr\u00e8s d\u00e9taill\u00e9, mais si votre objectif est d&rsquo;am\u00e9liorer la s\u00e9curit\u00e9 des solutions, deux choses peuvent avoir un impact important\u00a0:<\/p>\n<ul>\n<li>Avoir un fournisseur d&rsquo;applications, de plateformes ou de syst\u00e8mes bien \u00e9tabli qui est transparent quant \u00e0 son statut et ses mesures de s\u00e9curit\u00e9.<\/li>\n<li>Aligner les processus de solution de votre organisation sur les meilleures pratiques, comme l\u2019inclusion de l\u2019authentification multifactorielle.<\/li>\n<\/ul>\n<h4><strong>Aide et ressources<\/strong><\/h4>\n<p><strong>Fait en bref<\/strong>\u00a0: Faites participer votre directeur technologique (CTO) et votre \u00e9quipe informatique si vous avez une solution ou une partie d&rsquo;une solution qui approche de la fin de vie (le plus t\u00f4t sera le mieux)\u00a0; il permet une \u00e9valuation plus approfondie des risques.<\/p>\n<p>Nous sommes toujours disponibles pour les \u00e9valuations de la sant\u00e9 et des risques de l&rsquo;organisation. En tant qu&rsquo;experts de ClickSoftware et de Salesforce, si vous \u00eates confront\u00e9s \u00e0 la date limite de fin de vie de Click 8.3, <a href=\"https:\/\/diabsolut.com\/?page_id=30454&amp;lang=fr\" target=\"_blank\" rel=\"noopener\">nous sommes l\u00e0<\/a> pour r\u00e9pondre \u00e0 toutes vos questions ou pr\u00e9occupations, sans aucune obligation.<\/p>\n<p>Pour en savoir plus sur MFA et Salesforce, <a href=\"https:\/\/diabsolut.com\/authentification-multifactorielle-de-salesforce\/?lang=fr\" target=\"_blank\" rel=\"noopener\">lisez notre blog<\/a> ; pour plus d&rsquo;informations sur la prochaine s\u00e9curit\u00e9 Click 8.3 EOL, Salesforce Field Service et la transition \u00e0 Salesforce , <a href=\"https:\/\/www2.diabsolut.com\/l\/71372\/2022-04-04\/hrb71p\" target=\"_blank\" rel=\"noopener\">lisez notre eBook<\/a> ; et pour les informations de s\u00e9curit\u00e9 de Salesforce, <a href=\"https:\/\/security.salesforce.com\/\" target=\"_blank\" rel=\"noopener\">visitez ce lien.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Faits saillants\u00a0: s\u00e9curit\u00e9 de la solution et impact de la fin de vie de Click\u00a08.3 Auteur: Stephen Sugumar Si vous \u00eates un utilisateur de Click 8.3 ou que vous \u00eates curieux de conna\u00eetre la fin de vie et les mesures de s\u00e9curit\u00e9 des solutions, voici quelques faits et ressources plus approfondies qui vous aideront \u00e0&#8230;<\/p>\n","protected":false},"author":31,"featured_media":11921,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2059,2773,2054],"tags":[2114,2371,2754,2120,2058,2261,2611],"class_list":["post-11923","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nouvelles-fr","category-blog-salesforce-fr","category-blog-services-mobiles","tag-salesforce-fr","tag-click-fr","tag-diabsolut-2-fr","tag-securite","tag-security-fr","tag-sfs","tag-solution-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>L&#039;impact de la fin de vie de Click 8.3 | ClickSoftware<\/title>\n<meta name=\"description\" content=\"Besoin d\u2019infos sur la fin de vie et la s\u00e9curit\u00e9 des solutions ? D\u00e9couvrez notre blog sur l\u2019impact de la fin de vie de Click 8.3.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/diabsolut.com\/fr\/securite-et-impact-de-click-8-3\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Faits saillants : s\u00e9curit\u00e9 de la solution et impact de la fin de vie de Click 8.3\" \/>\n<meta property=\"og:description\" content=\"Besoin d\u2019infos sur la fin de vie et la s\u00e9curit\u00e9 des solutions ? D\u00e9couvrez notre blog sur l\u2019impact de la fin de vie de Click 8.3.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/diabsolut.com\/fr\/securite-et-impact-de-click-8-3\/\" \/>\n<meta property=\"og:site_name\" content=\"Diabsolut\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DiabsolutCom\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-07T08:40:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-10T19:58:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stephen Sugumar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Diabsolut\" \/>\n<meta name=\"twitter:site\" content=\"@Diabsolut\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stephen Sugumar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/diabsolut.com\\\/fr\\\/securite-et-impact-de-click-8-3\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/diabsolut.com\\\/fr\\\/securite-et-impact-de-click-8-3\\\/\"},\"author\":{\"name\":\"Stephen Sugumar\",\"@id\":\"https:\\\/\\\/diabsolut.com\\\/#\\\/schema\\\/person\\\/ec30c41b047004fe1fc13bdd5f60ad04\"},\"headline\":\"Faits saillants : s\u00e9curit\u00e9 de la solution et impact de la fin de vie de Click 8.3\",\"datePublished\":\"2022-06-07T08:40:18+00:00\",\"dateModified\":\"2026-03-10T19:58:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/diabsolut.com\\\/fr\\\/securite-et-impact-de-click-8-3\\\/\"},\"wordCount\":1014,\"publisher\":{\"@id\":\"https:\\\/\\\/diabsolut.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/diabsolut.com\\\/fr\\\/securite-et-impact-de-click-8-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/diabsolut.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Click-to-SFS-security-blog.jpg\",\"keywords\":[\"#Salesforce\",\"click\",\"diabsolut\",\"S\u00e9curit\u00e9\",\"Security\",\"SFS\",\"solution\"],\"articleSection\":[\"Nouvelles\",\"Salesforce\",\"Services mobiles\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/diabsolut.com\\\/fr\\\/securite-et-impact-de-click-8-3\\\/\",\"url\":\"https:\\\/\\\/diabsolut.com\\\/fr\\\/securite-et-impact-de-click-8-3\\\/\",\"name\":\"L'impact de la fin de vie de Click 8.3 | ClickSoftware\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/diabsolut.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/diabsolut.com\\\/fr\\\/securite-et-impact-de-click-8-3\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/diabsolut.com\\\/fr\\\/securite-et-impact-de-click-8-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/diabsolut.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Click-to-SFS-security-blog.jpg\",\"datePublished\":\"2022-06-07T08:40:18+00:00\",\"dateModified\":\"2026-03-10T19:58:55+00:00\",\"description\":\"Besoin d\u2019infos sur la fin de vie et la s\u00e9curit\u00e9 des solutions ? D\u00e9couvrez notre blog sur l\u2019impact de la fin de vie de Click 8.3.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/diabsolut.com\\\/fr\\\/securite-et-impact-de-click-8-3\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/diabsolut.com\\\/fr\\\/securite-et-impact-de-click-8-3\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/diabsolut.com\\\/fr\\\/securite-et-impact-de-click-8-3\\\/#primaryimage\",\"url\":\"https:\\\/\\\/diabsolut.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Click-to-SFS-security-blog.jpg\",\"contentUrl\":\"https:\\\/\\\/diabsolut.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Click-to-SFS-security-blog.jpg\",\"width\":600,\"height\":400,\"caption\":\"click salesforce security blog diabsolut\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/diabsolut.com\\\/fr\\\/securite-et-impact-de-click-8-3\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/diabsolut.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Faits saillants : s\u00e9curit\u00e9 de la solution et impact de la fin de vie de Click 8.3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/diabsolut.com\\\/#website\",\"url\":\"https:\\\/\\\/diabsolut.com\\\/\",\"name\":\"Diabsolut\",\"description\":\"Salesforce, Agentforce &amp; Certinia Experts\",\"publisher\":{\"@id\":\"https:\\\/\\\/diabsolut.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/diabsolut.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/diabsolut.com\\\/#organization\",\"name\":\"Diabsolut\",\"url\":\"https:\\\/\\\/diabsolut.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/diabsolut.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/diabsolut.com\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Logo-Diabsolut.png\",\"contentUrl\":\"https:\\\/\\\/diabsolut.com\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Logo-Diabsolut.png\",\"width\":376,\"height\":201,\"caption\":\"Diabsolut\"},\"image\":{\"@id\":\"https:\\\/\\\/diabsolut.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DiabsolutCom\\\/\",\"https:\\\/\\\/x.com\\\/Diabsolut\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/diabsolut\\\/\",\"https:\\\/\\\/www.instagram.com\\\/diabsolutcom\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCnEvBmkwDdGiXeh7f62mSHA\\\/featured\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/diabsolut.com\\\/#\\\/schema\\\/person\\\/ec30c41b047004fe1fc13bdd5f60ad04\",\"name\":\"Stephen Sugumar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4fb330ed5429bcbb809d633699fbfa4cd6e0cb18381555b91e42465664bcef35?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4fb330ed5429bcbb809d633699fbfa4cd6e0cb18381555b91e42465664bcef35?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4fb330ed5429bcbb809d633699fbfa4cd6e0cb18381555b91e42465664bcef35?s=96&d=mm&r=g\",\"caption\":\"Stephen Sugumar\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"L'impact de la fin de vie de Click 8.3 | ClickSoftware","description":"Besoin d\u2019infos sur la fin de vie et la s\u00e9curit\u00e9 des solutions ? D\u00e9couvrez notre blog sur l\u2019impact de la fin de vie de Click 8.3.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/diabsolut.com\/fr\/securite-et-impact-de-click-8-3\/","og_locale":"fr_FR","og_type":"article","og_title":"Faits saillants : s\u00e9curit\u00e9 de la solution et impact de la fin de vie de Click 8.3","og_description":"Besoin d\u2019infos sur la fin de vie et la s\u00e9curit\u00e9 des solutions ? D\u00e9couvrez notre blog sur l\u2019impact de la fin de vie de Click 8.3.","og_url":"https:\/\/diabsolut.com\/fr\/securite-et-impact-de-click-8-3\/","og_site_name":"Diabsolut","article_publisher":"https:\/\/www.facebook.com\/DiabsolutCom\/","article_published_time":"2022-06-07T08:40:18+00:00","article_modified_time":"2026-03-10T19:58:55+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog.jpg","type":"image\/jpeg"}],"author":"Stephen Sugumar","twitter_card":"summary_large_image","twitter_creator":"@Diabsolut","twitter_site":"@Diabsolut","twitter_misc":{"\u00c9crit par":"Stephen Sugumar","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/diabsolut.com\/fr\/securite-et-impact-de-click-8-3\/#article","isPartOf":{"@id":"https:\/\/diabsolut.com\/fr\/securite-et-impact-de-click-8-3\/"},"author":{"name":"Stephen Sugumar","@id":"https:\/\/diabsolut.com\/#\/schema\/person\/ec30c41b047004fe1fc13bdd5f60ad04"},"headline":"Faits saillants : s\u00e9curit\u00e9 de la solution et impact de la fin de vie de Click 8.3","datePublished":"2022-06-07T08:40:18+00:00","dateModified":"2026-03-10T19:58:55+00:00","mainEntityOfPage":{"@id":"https:\/\/diabsolut.com\/fr\/securite-et-impact-de-click-8-3\/"},"wordCount":1014,"publisher":{"@id":"https:\/\/diabsolut.com\/#organization"},"image":{"@id":"https:\/\/diabsolut.com\/fr\/securite-et-impact-de-click-8-3\/#primaryimage"},"thumbnailUrl":"https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog.jpg","keywords":["#Salesforce","click","diabsolut","S\u00e9curit\u00e9","Security","SFS","solution"],"articleSection":["Nouvelles","Salesforce","Services mobiles"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/diabsolut.com\/fr\/securite-et-impact-de-click-8-3\/","url":"https:\/\/diabsolut.com\/fr\/securite-et-impact-de-click-8-3\/","name":"L'impact de la fin de vie de Click 8.3 | ClickSoftware","isPartOf":{"@id":"https:\/\/diabsolut.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/diabsolut.com\/fr\/securite-et-impact-de-click-8-3\/#primaryimage"},"image":{"@id":"https:\/\/diabsolut.com\/fr\/securite-et-impact-de-click-8-3\/#primaryimage"},"thumbnailUrl":"https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog.jpg","datePublished":"2022-06-07T08:40:18+00:00","dateModified":"2026-03-10T19:58:55+00:00","description":"Besoin d\u2019infos sur la fin de vie et la s\u00e9curit\u00e9 des solutions ? D\u00e9couvrez notre blog sur l\u2019impact de la fin de vie de Click 8.3.","breadcrumb":{"@id":"https:\/\/diabsolut.com\/fr\/securite-et-impact-de-click-8-3\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/diabsolut.com\/fr\/securite-et-impact-de-click-8-3\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/diabsolut.com\/fr\/securite-et-impact-de-click-8-3\/#primaryimage","url":"https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog.jpg","contentUrl":"https:\/\/diabsolut.com\/wp-content\/uploads\/2022\/06\/Click-to-SFS-security-blog.jpg","width":600,"height":400,"caption":"click salesforce security blog diabsolut"},{"@type":"BreadcrumbList","@id":"https:\/\/diabsolut.com\/fr\/securite-et-impact-de-click-8-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/diabsolut.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Faits saillants : s\u00e9curit\u00e9 de la solution et impact de la fin de vie de Click 8.3"}]},{"@type":"WebSite","@id":"https:\/\/diabsolut.com\/#website","url":"https:\/\/diabsolut.com\/","name":"Diabsolut","description":"Salesforce, Agentforce &amp; Certinia Experts","publisher":{"@id":"https:\/\/diabsolut.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/diabsolut.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/diabsolut.com\/#organization","name":"Diabsolut","url":"https:\/\/diabsolut.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/diabsolut.com\/#\/schema\/logo\/image\/","url":"https:\/\/diabsolut.com\/wp-content\/uploads\/2020\/03\/Logo-Diabsolut.png","contentUrl":"https:\/\/diabsolut.com\/wp-content\/uploads\/2020\/03\/Logo-Diabsolut.png","width":376,"height":201,"caption":"Diabsolut"},"image":{"@id":"https:\/\/diabsolut.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DiabsolutCom\/","https:\/\/x.com\/Diabsolut","https:\/\/www.linkedin.com\/company\/diabsolut\/","https:\/\/www.instagram.com\/diabsolutcom\/","https:\/\/www.youtube.com\/channel\/UCnEvBmkwDdGiXeh7f62mSHA\/featured"]},{"@type":"Person","@id":"https:\/\/diabsolut.com\/#\/schema\/person\/ec30c41b047004fe1fc13bdd5f60ad04","name":"Stephen Sugumar","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/4fb330ed5429bcbb809d633699fbfa4cd6e0cb18381555b91e42465664bcef35?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4fb330ed5429bcbb809d633699fbfa4cd6e0cb18381555b91e42465664bcef35?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4fb330ed5429bcbb809d633699fbfa4cd6e0cb18381555b91e42465664bcef35?s=96&d=mm&r=g","caption":"Stephen Sugumar"}}]}},"_links":{"self":[{"href":"https:\/\/diabsolut.com\/fr\/wp-json\/wp\/v2\/posts\/11923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/diabsolut.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/diabsolut.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/diabsolut.com\/fr\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/diabsolut.com\/fr\/wp-json\/wp\/v2\/comments?post=11923"}],"version-history":[{"count":4,"href":"https:\/\/diabsolut.com\/fr\/wp-json\/wp\/v2\/posts\/11923\/revisions"}],"predecessor-version":[{"id":31810,"href":"https:\/\/diabsolut.com\/fr\/wp-json\/wp\/v2\/posts\/11923\/revisions\/31810"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/diabsolut.com\/fr\/wp-json\/wp\/v2\/media\/11921"}],"wp:attachment":[{"href":"https:\/\/diabsolut.com\/fr\/wp-json\/wp\/v2\/media?parent=11923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/diabsolut.com\/fr\/wp-json\/wp\/v2\/categories?post=11923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/diabsolut.com\/fr\/wp-json\/wp\/v2\/tags?post=11923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}