{"id":34995,"date":"2025-09-13T21:29:41","date_gmt":"2025-09-14T01:29:41","guid":{"rendered":"https:\/\/www.rsa.com\/?page_id=34995"},"modified":"2025-09-13T21:33:02","modified_gmt":"2025-09-14T01:33:02","slug":"more-than-phishing-resistance","status":"publish","type":"page","link":"https:\/\/www.rsa.com\/fr_ca\/rsa-ishield-key-2-series\/more-than-phishing-resistance\/","title":{"rendered":"Plus qu'une r\u00e9sistance \u00e0 l'hame\u00e7onnage"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":31423,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-id-iq-landing-page.blade.php","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"class_list":["post-34995","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>More than Phishing Resistance - RSA<\/title>\n<meta name=\"description\" content=\"Accelerate passwordless, advance Zero Trust, and meet global regulations with the RSA iShield. Read the RSA report to see the high-risk use cases of the iShield\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr_ca\/rsa-ishield-key-2-series\/more-than-phishing-resistance\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"More than Phishing Resistance - RSA\" \/>\n<meta property=\"og:description\" content=\"Accelerate passwordless, advance Zero Trust, and meet global regulations with the RSA iShield. Read the RSA report to see the high-risk use cases of the iShield\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr_ca\/rsa-ishield-key-2-series\/more-than-phishing-resistance\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-14T01:33:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/rsa-ishield-key-2-series\\\/more-than-phishing-resistance\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/rsa-ishield-key-2-series\\\/more-than-phishing-resistance\\\/\",\"name\":\"More than Phishing Resistance - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"datePublished\":\"2025-09-14T01:29:41+00:00\",\"dateModified\":\"2025-09-14T01:33:02+00:00\",\"description\":\"Accelerate passwordless, advance Zero Trust, and meet global regulations with the RSA iShield. Read the RSA report to see the high-risk use cases of the iShield\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/rsa-ishield-key-2-series\\\/more-than-phishing-resistance\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/rsa-ishield-key-2-series\\\/more-than-phishing-resistance\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/rsa-ishield-key-2-series\\\/more-than-phishing-resistance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RSA iShield Key 2 Series\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/rsa-ishield-key-2-series\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"More than Phishing Resistance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Plus qu'une r\u00e9sistance \u00e0 l'hame\u00e7onnage - RSA","description":"Acc\u00e9l\u00e9rez l'absence de mot de passe, faites progresser la confiance z\u00e9ro et respectez les r\u00e9glementations internationales gr\u00e2ce \u00e0 RSA iShield. Lisez le rapport RSA pour d\u00e9couvrir les cas d'utilisation \u00e0 haut risque de l'iShield.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr_ca\/rsa-ishield-key-2-series\/more-than-phishing-resistance\/","og_locale":"fr_CA","og_type":"article","og_title":"More than Phishing Resistance - RSA","og_description":"Accelerate passwordless, advance Zero Trust, and meet global regulations with the RSA iShield. Read the RSA report to see the high-risk use cases of the iShield","og_url":"https:\/\/www.rsa.com\/fr_ca\/rsa-ishield-key-2-series\/more-than-phishing-resistance\/","og_site_name":"RSA","article_modified_time":"2025-09-14T01:33:02+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/rsa-ishield-key-2-series\/more-than-phishing-resistance\/","url":"https:\/\/www.rsa.com\/rsa-ishield-key-2-series\/more-than-phishing-resistance\/","name":"Plus qu'une r\u00e9sistance \u00e0 l'hame\u00e7onnage - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"datePublished":"2025-09-14T01:29:41+00:00","dateModified":"2025-09-14T01:33:02+00:00","description":"Acc\u00e9l\u00e9rez l'absence de mot de passe, faites progresser la confiance z\u00e9ro et respectez les r\u00e9glementations internationales gr\u00e2ce \u00e0 RSA iShield. Lisez le rapport RSA pour d\u00e9couvrir les cas d'utilisation \u00e0 haut risque de l'iShield.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/rsa-ishield-key-2-series\/more-than-phishing-resistance\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/rsa-ishield-key-2-series\/more-than-phishing-resistance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/rsa-ishield-key-2-series\/more-than-phishing-resistance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"RSA iShield Key 2 Series","item":"https:\/\/www.rsa.com\/rsa-ishield-key-2-series\/"},{"@type":"ListItem","position":3,"name":"More than Phishing Resistance"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/pages\/34995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/comments?post=34995"}],"version-history":[{"count":7,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/pages\/34995\/revisions"}],"predecessor-version":[{"id":35028,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/pages\/34995\/revisions\/35028"}],"up":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/pages\/31423"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media?parent=34995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}