{"id":91617,"date":"2023-11-24T14:09:55","date_gmt":"2023-11-24T13:09:55","guid":{"rendered":"https:\/\/preprod.castel.fr\/?page_id=91617"},"modified":"2025-09-22T09:36:32","modified_gmt":"2025-09-22T07:36:32","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center intro-bleu\">IT SECURITY AND CYBERSECURITY ARE AN ABSOLUTE PRIORITY FOR US<\/h2>\n\n\n\n<p class=\"intro-grise\">We have implemented security features and protocols to ensure the protection and security of the data that is so important to our customers.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Castel\u2019s solutions have been designed in line with the philosophy of the French laws on the orientation and programming of internal security performance (LOPPSI), to minimise the risks of digital and physical attack. To achieve this, we have innovated to restrict the attack surface of our solutions. Our products are cybersecure, vandal-proof and offer an appropriate response in the event of malicious intent.<\/p>\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-color\" style=\"color:#005da0\"><strong><strong>NETWORK SECURITY<\/strong><\/strong><\/p>\n\n\n\n<p>> Connection authentication on Ethernet networks via the 802.1X protocol and Radius servers (RFC 2865)<br>> Failover solution for reliable remote management<br>> VLAN support<br>> Security certificates adaptable to your requirements <br>> Genuine onboard firewall allowing you to define restrictions by service and by IP address<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-color\" style=\"color:#005da0\"><strong>ENCRYPTION<\/strong><\/p>\n\n\n\n<p>&gt; The configuration web pages are fully TLS 1.3 secure<br>&gt; The call setup is encrypted using SIP TLS<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-color\" style=\"color:#005da0\"><strong>UPDATES<\/strong><\/p>\n\n\n\n<p>&gt; Regular firmware updates over several years<br>&gt; Use of an operating system that is highly monitored for security flaws and guaranteed for correction maintenance over the long term<br>&gt; Continuous improvement of security bricks and functionalities<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-color\" style=\"color:#005da0\"><strong>PASSWORD POLICY<\/strong><\/p>\n\n\n\n<p>&gt; Advanced password encryption<br>&gt; The database storing encrypted passwords is secure<br>&gt; Possibility of setting constraints on password complexity and periodic renewal<br>&gt; Different password policy for different account types (user\/administrator)<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-color\" style=\"color:#005da0\"><strong><strong>SECURITY LEVEL TAILORED TO YOUR NEEDS<\/strong><\/strong><\/p>\n\n\n\n<p>&gt; A wizard guides you during commissioning toward the solution best suited to your needs<br>&gt; Native locking of unused ports<br>&gt; The level of security evolves with your expectations<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-color\" style=\"color:#005da0\"><strong>INTRUSION AND VULNERABILITY TESTING<\/strong><\/p>\n\n\n\n<p>&gt; Each firmware version undergoes several series of intrusion tests and is evaluated for improvements or corrections before delivery<br>&gt; The security event log is non-erasable and tamper-proof<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/11\/picto-RJ-2.jpg\" alt=\"\" class=\"wp-image-94193\" width=\"97\" height=\"148\"\/><\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<p><strong>ETHERNET CONNECTION SECURITY<\/strong><br>To secure the Ethernet socket on your IP intercom, accessible from outside the area secured by the access control system, Castel has developed effective solutions to prevent any unauthorised use of its network connection.<br>The first native barrier is its Radius authentication mode. This software solution blocks access to the network by hardware that is not recognised by the server.<br>The Castel IP Protect solution physically breaks the network connection in the event of tampering. Castel offers various opening detection technologies to enable this solution.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>IT SECURITY AND CYBERSECURITY ARE AN ABSOLUTE PRIORITY FOR US We have implemented security features and protocols to ensure the protection and security of the data that is so important to our customers. Castel\u2019s solutions have been designed in line with the philosophy of the French laws on the orientation and programming of internal security [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":90361,"parent":534,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-91617","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity - Castel, communication &amp; security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity - Castel, communication &amp; security\" \/>\n<meta property=\"og:description\" content=\"IT SECURITY AND CYBERSECURITY ARE AN ABSOLUTE PRIORITY FOR US We have implemented security features and protocols to ensure the protection and security of the data that is so important to our customers. Castel\u2019s solutions have been designed in line with the philosophy of the French laws on the orientation and programming of internal security [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Castel, communication &amp; security\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-22T07:36:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/\",\"url\":\"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/\",\"name\":\"Cybersecurity - Castel, communication & security\",\"isPartOf\":{\"@id\":\"https:\/\/preprod.castel.fr\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite.jpg\",\"datePublished\":\"2023-11-24T13:09:55+00:00\",\"dateModified\":\"2025-09-22T07:36:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/#primaryimage\",\"url\":\"https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite.jpg\",\"contentUrl\":\"https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite.jpg\",\"width\":1920,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/preprod.castel.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Castel\",\"item\":\"https:\/\/preprod.castel.fr\/en\/castel\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/preprod.castel.fr\/en\/#website\",\"url\":\"https:\/\/preprod.castel.fr\/en\/\",\"name\":\"Castel, communication & security\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/preprod.castel.fr\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity - Castel, communication & security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity - Castel, communication & security","og_description":"IT SECURITY AND CYBERSECURITY ARE AN ABSOLUTE PRIORITY FOR US We have implemented security features and protocols to ensure the protection and security of the data that is so important to our customers. Castel\u2019s solutions have been designed in line with the philosophy of the French laws on the orientation and programming of internal security [&hellip;]","og_url":"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/","og_site_name":"Castel, communication & security","article_modified_time":"2025-09-22T07:36:32+00:00","og_image":[{"width":1920,"height":350,"url":"https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/","url":"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/","name":"Cybersecurity - Castel, communication & security","isPartOf":{"@id":"https:\/\/preprod.castel.fr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite.jpg","datePublished":"2023-11-24T13:09:55+00:00","dateModified":"2025-09-22T07:36:32+00:00","breadcrumb":{"@id":"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/#primaryimage","url":"https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite.jpg","contentUrl":"https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite.jpg","width":1920,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/preprod.castel.fr\/en\/castel\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/preprod.castel.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Castel","item":"https:\/\/preprod.castel.fr\/en\/castel\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/preprod.castel.fr\/en\/#website","url":"https:\/\/preprod.castel.fr\/en\/","name":"Castel, communication & security","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/preprod.castel.fr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"featured_image_src":"https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite-600x350.jpg","featured_image_src_square":"https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite-600x350.jpg","uagb_featured_image_src":{"full":["https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite.jpg",1920,350,false],"thumbnail":["https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite-150x150.jpg",150,150,true],"medium":["https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite-300x55.jpg",300,55,true],"medium_large":["https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite-768x140.jpg",768,140,true],"large":["https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite-1024x187.jpg",1024,187,true],"1536x1536":["https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite-1536x280.jpg",1536,280,true],"2048x2048":["https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite.jpg",1920,350,false],"home-news":["https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite-320x185.jpg",320,185,true],"secteur":["https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite-320x285.jpg",320,285,true],"entete":["https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite.jpg",1920,350,false],"diaporama":["https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite.jpg",1920,350,false],"ab-block-post-grid-landscape":["https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite-600x350.jpg",600,350,true],"ab-block-post-grid-square":["https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite-600x350.jpg",600,350,true],"wpcf7-post-image":["https:\/\/preprod.castel.fr\/wp-fi\/wp-content\/uploads\/2023\/10\/cybersecurite-80x80.jpg",80,80,true]},"uagb_author_info":{"display_name":"Caroline Bichon","author_link":"https:\/\/preprod.castel.fr\/en\/author\/caroline-bichon\/"},"uagb_comment_info":0,"uagb_excerpt":"IT SECURITY AND CYBERSECURITY ARE AN ABSOLUTE PRIORITY FOR US We have implemented security features and protocols to ensure the protection and security of the data that is so important to our customers. Castel\u2019s solutions have been designed in line with the philosophy of the French laws on the orientation and programming of internal security&hellip;","publishpress_future_action":{"enabled":false,"date":"2026-04-16 18:46:43","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"translation_priority","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/preprod.castel.fr\/en\/wp-json\/wp\/v2\/pages\/91617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/preprod.castel.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/preprod.castel.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/preprod.castel.fr\/en\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/preprod.castel.fr\/en\/wp-json\/wp\/v2\/comments?post=91617"}],"version-history":[{"count":8,"href":"https:\/\/preprod.castel.fr\/en\/wp-json\/wp\/v2\/pages\/91617\/revisions"}],"predecessor-version":[{"id":156093,"href":"https:\/\/preprod.castel.fr\/en\/wp-json\/wp\/v2\/pages\/91617\/revisions\/156093"}],"up":[{"embeddable":true,"href":"https:\/\/preprod.castel.fr\/en\/wp-json\/wp\/v2\/pages\/534"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/preprod.castel.fr\/en\/wp-json\/wp\/v2\/media\/90361"}],"wp:attachment":[{"href":"https:\/\/preprod.castel.fr\/en\/wp-json\/wp\/v2\/media?parent=91617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}