{"id":4692,"date":"2020-07-14T14:50:36","date_gmt":"2020-07-14T18:50:36","guid":{"rendered":"https:\/\/www.technicost.com\/?p=4692\/"},"modified":"2020-07-15T11:27:29","modified_gmt":"2020-07-15T15:27:29","slug":"maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost","status":"publish","type":"post","link":"https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/","title":{"rendered":"Maximisation de la s\u00e9curit\u00e9 par l\u2019authentification biom\u00e9trique de l\u2019identit\u00e9 int\u00e9gr\u00e9e aux logiciels financiers de Technicost"},"content":{"rendered":"\n<p><strong>Montr\u00e9al, le 14 juillet 2020<\/strong> \u2013 Proposant des logiciels de gestion financi\u00e8re colligeant des informations sensibles et consid\u00e9rant les risques associ\u00e9s \u00e0 la fraude par usurpation d\u2019identit\u00e9, <a rel=\"noreferrer noopener\" href=\"https:\/\/www.technicost.com\/fr\/\" target=\"_blank\">Technicost<\/a> implante l\u2019authentification d\u2019identit\u00e9 par l\u2019analyse biom\u00e9trique comportementale \u00e0 l\u2018ensemble de ses produits en int\u00e9grant le logiciel d\u2019analyse biom\u00e9trique comportementale <a rel=\"noreferrer noopener\" href=\"https:\/\/www.f8th.ai\/\" target=\"_blank\">F8th<\/a>.<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/www.f8th.ai\/\" target=\"_blank\">F8th <\/a>propose un logiciel qui assure l\u2019authentification de l\u2019identit\u00e9 des utilisateurs par l\u2019int\u00e9gration de calculs biom\u00e9triques comportementaux. Appuy\u00e9 de l\u2019intelligence artificielle pour \u00e9tablir diverses corr\u00e9lations, le logiciel r\u00e9ussit \u00e0 reconna\u00eetre l\u2019\u00e9volution des diff\u00e9rents mouvements d\u00e9ploy\u00e9s par l\u2019utilisateur, derri\u00e8re son appareil \u00e9lectronique, \u00e0 travers sa souris. Il analyse les comportements autant sur l\u2019ordinateur, la tablette que l\u2019appareil mobile.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.technicost.com\/fr\/\">Technicost<\/a>, un des leaders canadiens en logiciels financiers, est la premi\u00e8re entreprise qu\u00e9b\u00e9coise \u00e0 ins\u00e9rer la technologie F8Th \u00e0 ses applications. \u2018\u2019<em> En int\u00e9grant l\u2019intelligence artificielle pour l\u2019authentification des utilisateurs par l\u2019analyse comportementale de l\u2019utilisateur, nous \u00e9levons s\u00e9rieusement les barri\u00e8res de s\u00e9curit\u00e9 de nos clients en r\u00e9duisant au maximum les risques de fraude identitaire<\/em> \u2019\u2019 pr\u00e9cise <a rel=\"noreferrer noopener\" href=\"https:\/\/www.linkedin.com\/in\/yves-gagnon-mba-1946353?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_contact_details%3BoVciKf1qROue2RiM%2FarcjA%3D%3D\" target=\"_blank\">Yves Gagnon<\/a>, PDG de Technicost.<\/p>\n\n\n\n<p>L\u2019enjeu de s\u00e9curit\u00e9 sur la toile est majeur. \u2018\u2019<em>Consid\u00e9rant la quantit\u00e9 faramineuse de mots de passe \u00e9br\u00e9ch\u00e9s en circulation, ou encore renouvel\u00e9s \u00e0 r\u00e9p\u00e9tition, il devient imp\u00e9ratif de s\u2019outiller au maximum contre l\u2019usurpation d\u2019identit\u00e9 pour \u00e9viter les fraudes majeures. Hautement s\u00e9curis\u00e9, il est pratiquement impossible de r\u00e9p\u00e9ter exactement un m\u00eame comportement, sans sembler suspect, d\u2019o\u00f9 la finesse de notre solution<\/em>\u2019\u2019 nous pr\u00e9cise <a rel=\"noreferrer noopener\" href=\"https:\/\/www.linkedin.com\/in\/jonathan-gagne?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_contact_details%3BxHtuf3g0SRO9rMy9d9EX%2FA%3D%3D\" target=\"_blank\">Jonathan Gagn\u00e9, PDG de F8th<\/a>.<\/p>\n\n\n\n<p><strong>\u00c0 propose de F8th<\/strong><br><a href=\"https:\/\/www.f8th.ai\/\">F8th<\/a> assure la gestion et l\u2019authentification de l\u2019identit\u00e9 par l\u2019intelligence artificielle et les calculs biom\u00e9triques des mouvements des utilisateurs. Install\u00e9e \u00e0 Toronto, l\u2019entreprise est suivie par les plus grands joueurs, dont IBM, Amazon ainsi que le minist\u00e8re de l\u2019Innovation, Sciences et D\u00e9veloppement \u00e9conomique Canada (ISDE). Pr\u00e9curseur en mod\u00e9lisation comportementale biom\u00e9trique par l\u2019intelligence artificielle, l\u2019entreprise se d\u00e9marque actuellement par la quantit\u00e9 et la qualit\u00e9 des mod\u00e8les d\u00e9velopp\u00e9s. Incorpor\u00e9 en 2019, F8th est une jeune entreprise, cr\u00e9\u00e9e par Jonathan Gagn\u00e9, g\u00e9nie informaticien et globe-trotter qu\u00e9b\u00e9cois ayant d\u00e9velopp\u00e9 sa technologie lors de ses p\u00e9riples professionnels.<\/p>\n\n\n\n<p><strong>\u00c0 propos de Technicost<\/strong><br>Alliant agilit\u00e9, analyse des donn\u00e9es et rapidit\u00e9 d\u2019ex\u00e9cution, <a href=\"https:\/\/www.technicost.com\/fr\/\">Technicost<\/a> se sp\u00e9cialise dans le d\u00e9veloppement et l\u2019implantation de la <a rel=\"noreferrer noopener\" href=\"https:\/\/www.technicost.com\/fr\/\" target=\"_blank\">s\u00e9rie de logiciels financiers TechLOS, WebLOS, LMS, D\u00e9cision, LMS<\/a>, logiciels financiers allant de la constitution de dossiers de pr\u00eat (LOS) jusqu\u2019aux caisses d\u2019\u00e9pargne et de cr\u00e9dit canadiennes.<\/p>\n\n\n\n<p>Fond\u00e9e en 1982, Technicost fournit des logiciels financiers \u00e0 plus de 100 institutions financi\u00e8res et coop\u00e9ratives canadiennes, \u00e0 travers le Canada. Bien \u00e9tablie dans l\u2019industrie, notre \u00e9quipe de sp\u00e9cialistes en informatique et en finance assure une vision progressive et avant-gardiste des logiciels financiers. Technicost est membre du <a rel=\"noreferrer noopener\" href=\"https:\/\/www.cooperators.ca\/fr-CA\/\" target=\"_blank\">Groupe Co-operators limit\u00e9e<\/a>.<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p class=\"has-text-align-center\">-30-<\/p>\n\n\n\n<p>Source : Marie-Claude Lavoie | Gestionnaire marketing<br><a href=\"mailto:Mclavoie@technicost.com\">Mclavoie@technicost.com<\/a><br>TECHNICOST INC | www.technicost.com<br>4200 Boulevard Saint-Laurent, bur. 905, Montreal, QC,  H2W 2R2<br>tel. : 514-985-0555 ext    210          c. : 514-586-2628<\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"45\" class=\"wp-image-4531\" style=\"width: 150px;\" src=\"https:\/\/www.technicost.com\/wp-content\/uploads\/2017\/06\/Technicost-Smaller.jpg\" alt=\"\" srcset=\"https:\/\/www.technicost.com\/wp-content\/uploads\/2017\/06\/Technicost-Smaller.jpg 368w, https:\/\/www.technicost.com\/wp-content\/uploads\/2017\/06\/Technicost-Smaller-300x90.jpg 300w, https:\/\/www.technicost.com\/wp-content\/uploads\/2017\/06\/Technicost-Smaller-10x3.jpg 10w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Montr\u00e9al, le 14 juillet 2020 \u2013 Proposant des logiciels de gestion financi\u00e8re colligeant des informations sensibles et consid\u00e9rant les risques associ\u00e9s \u00e0 la fraude par usurpation d\u2019identit\u00e9, Technicost implante l\u2019authentification d\u2019identit\u00e9 par l\u2019analyse biom\u00e9trique comportementale \u00e0 l\u2018ensemble de ses produits en int\u00e9grant le logiciel d\u2019analyse biom\u00e9trique comportementale F8th. F8th propose un logiciel qui assure l\u2019authentification [&hellip;]<\/p>\n","protected":false},"author":100,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[80,79,97,91,101,102,94,100,95,96,77,103,99],"class_list":["post-4692","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-banque","tag-caisse-populaire","tag-canada","tag-co-operators","tag-cumis","tag-f8th","tag-finance","tag-formulaire","tag-identite","tag-intelligence-artificielle","tag-logiciels-financiers","tag-pret-en-ligne","tag-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Maximisation de la s\u00e9curit\u00e9 par l\u2019authentification biom\u00e9trique de l\u2019identit\u00e9 int\u00e9gr\u00e9e aux logiciels financiers de Technicost - Technicost<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Maximisation de la s\u00e9curit\u00e9 par l\u2019authentification biom\u00e9trique de l\u2019identit\u00e9 int\u00e9gr\u00e9e aux logiciels financiers de Technicost - Technicost\" \/>\n<meta property=\"og:description\" content=\"Montr\u00e9al, le 14 juillet 2020 \u2013 Proposant des logiciels de gestion financi\u00e8re colligeant des informations sensibles et consid\u00e9rant les risques associ\u00e9s \u00e0 la fraude par usurpation d\u2019identit\u00e9, Technicost implante l\u2019authentification d\u2019identit\u00e9 par l\u2019analyse biom\u00e9trique comportementale \u00e0 l\u2018ensemble de ses produits en int\u00e9grant le logiciel d\u2019analyse biom\u00e9trique comportementale F8th. F8th propose un logiciel qui assure l\u2019authentification [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/\" \/>\n<meta property=\"og:site_name\" content=\"Technicost\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-14T18:50:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-15T15:27:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.technicost.com\/wp-content\/uploads\/2017\/06\/Technicost-Smaller.jpg\" \/>\n<meta name=\"author\" content=\"Gabriel P #1\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Technicost s&#039;allie \u00e0 F8th pour r\u00e9duire la fraude identitaire\" \/>\n<meta name=\"twitter:description\" content=\"Technicost implante l\u2019authentification d\u2019identit\u00e9 par l\u2019analyse biom\u00e9trique comportementale \u00e0 l\u2018ensemble de ses produits en int\u00e9grant le logiciel d\u2019analyse biom\u00e9trique comportementale F8th.\" \/>\n<meta name=\"twitter:creator\" content=\"@Technicost1\" \/>\n<meta name=\"twitter:site\" content=\"@Technicost1\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gabriel P #1\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.technicost.com\\\/fr\\\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.technicost.com\\\/fr\\\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\\\/\"},\"author\":{\"name\":\"Gabriel P #1\",\"@id\":\"https:\\\/\\\/www.technicost.com\\\/#\\\/schema\\\/person\\\/67369a8abacb6bd5b6a4174fe24abd71\"},\"headline\":\"Maximisation de la s\u00e9curit\u00e9 par l\u2019authentification biom\u00e9trique de l\u2019identit\u00e9 int\u00e9gr\u00e9e aux logiciels financiers de Technicost\",\"datePublished\":\"2020-07-14T18:50:36+00:00\",\"dateModified\":\"2020-07-15T15:27:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.technicost.com\\\/fr\\\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\\\/\"},\"wordCount\":571,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.technicost.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.technicost.com\\\/fr\\\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.technicost.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/Technicost-Smaller.jpg\",\"keywords\":[\"banque\",\"caisse populaire\",\"Canada\",\"co-operators\",\"cumis\",\"F8th\",\"Finance\",\"formulaire\",\"Identit\u00e9\",\"Intelligence artificielle\",\"Logiciels financiers\",\"Pret en ligne\",\"S\u00e9curit\u00e9\"],\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.technicost.com\\\/fr\\\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.technicost.com\\\/fr\\\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\\\/\",\"url\":\"https:\\\/\\\/www.technicost.com\\\/fr\\\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\\\/\",\"name\":\"Maximisation de la s\u00e9curit\u00e9 par l\u2019authentification biom\u00e9trique de l\u2019identit\u00e9 int\u00e9gr\u00e9e aux logiciels financiers de Technicost - Technicost\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.technicost.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.technicost.com\\\/fr\\\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.technicost.com\\\/fr\\\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.technicost.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/Technicost-Smaller.jpg\",\"datePublished\":\"2020-07-14T18:50:36+00:00\",\"dateModified\":\"2020-07-15T15:27:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.technicost.com\\\/fr\\\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.technicost.com\\\/fr\\\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.technicost.com\\\/fr\\\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.technicost.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/Technicost-Smaller.jpg\",\"contentUrl\":\"https:\\\/\\\/www.technicost.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/Technicost-Smaller.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.technicost.com\\\/fr\\\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.technicost.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Maximisation de la s\u00e9curit\u00e9 par l\u2019authentification biom\u00e9trique de l\u2019identit\u00e9 int\u00e9gr\u00e9e aux logiciels financiers de Technicost\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.technicost.com\\\/#website\",\"url\":\"https:\\\/\\\/www.technicost.com\\\/\",\"name\":\"Technicost\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.technicost.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.technicost.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.technicost.com\\\/#organization\",\"name\":\"Technicost\",\"url\":\"https:\\\/\\\/www.technicost.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.technicost.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.technicost.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/Technicost-Smaller.jpg\",\"contentUrl\":\"https:\\\/\\\/www.technicost.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/Technicost-Smaller.jpg\",\"width\":368,\"height\":110,\"caption\":\"Technicost\"},\"image\":{\"@id\":\"https:\\\/\\\/www.technicost.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/Technicost1\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/122491\\\/admin\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.technicost.com\\\/#\\\/schema\\\/person\\\/67369a8abacb6bd5b6a4174fe24abd71\",\"name\":\"Gabriel P #1\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/531b87deb8eae573748d064de61f861287b32e46197cd99786484e23c53f3943?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/531b87deb8eae573748d064de61f861287b32e46197cd99786484e23c53f3943?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/531b87deb8eae573748d064de61f861287b32e46197cd99786484e23c53f3943?s=96&d=mm&r=g\",\"caption\":\"Gabriel P #1\"},\"url\":\"https:\\\/\\\/www.technicost.com\\\/fr\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Maximisation de la s\u00e9curit\u00e9 par l\u2019authentification biom\u00e9trique de l\u2019identit\u00e9 int\u00e9gr\u00e9e aux logiciels financiers de Technicost - Technicost","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/","og_locale":"fr_FR","og_type":"article","og_title":"Maximisation de la s\u00e9curit\u00e9 par l\u2019authentification biom\u00e9trique de l\u2019identit\u00e9 int\u00e9gr\u00e9e aux logiciels financiers de Technicost - Technicost","og_description":"Montr\u00e9al, le 14 juillet 2020 \u2013 Proposant des logiciels de gestion financi\u00e8re colligeant des informations sensibles et consid\u00e9rant les risques associ\u00e9s \u00e0 la fraude par usurpation d\u2019identit\u00e9, Technicost implante l\u2019authentification d\u2019identit\u00e9 par l\u2019analyse biom\u00e9trique comportementale \u00e0 l\u2018ensemble de ses produits en int\u00e9grant le logiciel d\u2019analyse biom\u00e9trique comportementale F8th. F8th propose un logiciel qui assure l\u2019authentification [&hellip;]","og_url":"https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/","og_site_name":"Technicost","article_published_time":"2020-07-14T18:50:36+00:00","article_modified_time":"2020-07-15T15:27:29+00:00","og_image":[{"url":"https:\/\/www.technicost.com\/wp-content\/uploads\/2017\/06\/Technicost-Smaller.jpg","type":"","width":"","height":""}],"author":"Gabriel P #1","twitter_card":"summary_large_image","twitter_title":"Technicost s'allie \u00e0 F8th pour r\u00e9duire la fraude identitaire","twitter_description":"Technicost implante l\u2019authentification d\u2019identit\u00e9 par l\u2019analyse biom\u00e9trique comportementale \u00e0 l\u2018ensemble de ses produits en int\u00e9grant le logiciel d\u2019analyse biom\u00e9trique comportementale F8th.","twitter_creator":"@Technicost1","twitter_site":"@Technicost1","twitter_misc":{"\u00c9crit par":"Gabriel P #1","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/#article","isPartOf":{"@id":"https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/"},"author":{"name":"Gabriel P #1","@id":"https:\/\/www.technicost.com\/#\/schema\/person\/67369a8abacb6bd5b6a4174fe24abd71"},"headline":"Maximisation de la s\u00e9curit\u00e9 par l\u2019authentification biom\u00e9trique de l\u2019identit\u00e9 int\u00e9gr\u00e9e aux logiciels financiers de Technicost","datePublished":"2020-07-14T18:50:36+00:00","dateModified":"2020-07-15T15:27:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/"},"wordCount":571,"commentCount":0,"publisher":{"@id":"https:\/\/www.technicost.com\/#organization"},"image":{"@id":"https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/#primaryimage"},"thumbnailUrl":"https:\/\/www.technicost.com\/wp-content\/uploads\/2017\/06\/Technicost-Smaller.jpg","keywords":["banque","caisse populaire","Canada","co-operators","cumis","F8th","Finance","formulaire","Identit\u00e9","Intelligence artificielle","Logiciels financiers","Pret en ligne","S\u00e9curit\u00e9"],"articleSection":["Uncategorized"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/","url":"https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/","name":"Maximisation de la s\u00e9curit\u00e9 par l\u2019authentification biom\u00e9trique de l\u2019identit\u00e9 int\u00e9gr\u00e9e aux logiciels financiers de Technicost - Technicost","isPartOf":{"@id":"https:\/\/www.technicost.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/#primaryimage"},"image":{"@id":"https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/#primaryimage"},"thumbnailUrl":"https:\/\/www.technicost.com\/wp-content\/uploads\/2017\/06\/Technicost-Smaller.jpg","datePublished":"2020-07-14T18:50:36+00:00","dateModified":"2020-07-15T15:27:29+00:00","breadcrumb":{"@id":"https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/#primaryimage","url":"https:\/\/www.technicost.com\/wp-content\/uploads\/2017\/06\/Technicost-Smaller.jpg","contentUrl":"https:\/\/www.technicost.com\/wp-content\/uploads\/2017\/06\/Technicost-Smaller.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.technicost.com\/fr\/maximisation-de-la-securite-par-lauthentification-biometrique-de-lidentite-integree-aux-logiciels-financiers-de-technicost\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.technicost.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Maximisation de la s\u00e9curit\u00e9 par l\u2019authentification biom\u00e9trique de l\u2019identit\u00e9 int\u00e9gr\u00e9e aux logiciels financiers de Technicost"}]},{"@type":"WebSite","@id":"https:\/\/www.technicost.com\/#website","url":"https:\/\/www.technicost.com\/","name":"Technicost","description":"","publisher":{"@id":"https:\/\/www.technicost.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.technicost.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.technicost.com\/#organization","name":"Technicost","url":"https:\/\/www.technicost.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.technicost.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.technicost.com\/wp-content\/uploads\/2017\/06\/Technicost-Smaller.jpg","contentUrl":"https:\/\/www.technicost.com\/wp-content\/uploads\/2017\/06\/Technicost-Smaller.jpg","width":368,"height":110,"caption":"Technicost"},"image":{"@id":"https:\/\/www.technicost.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Technicost1","https:\/\/www.linkedin.com\/company\/122491\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.technicost.com\/#\/schema\/person\/67369a8abacb6bd5b6a4174fe24abd71","name":"Gabriel P #1","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/531b87deb8eae573748d064de61f861287b32e46197cd99786484e23c53f3943?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/531b87deb8eae573748d064de61f861287b32e46197cd99786484e23c53f3943?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/531b87deb8eae573748d064de61f861287b32e46197cd99786484e23c53f3943?s=96&d=mm&r=g","caption":"Gabriel P #1"},"url":"https:\/\/www.technicost.com\/fr\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.technicost.com\/fr\/wp-json\/wp\/v2\/posts\/4692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technicost.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technicost.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technicost.com\/fr\/wp-json\/wp\/v2\/users\/100"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technicost.com\/fr\/wp-json\/wp\/v2\/comments?post=4692"}],"version-history":[{"count":10,"href":"https:\/\/www.technicost.com\/fr\/wp-json\/wp\/v2\/posts\/4692\/revisions"}],"predecessor-version":[{"id":4720,"href":"https:\/\/www.technicost.com\/fr\/wp-json\/wp\/v2\/posts\/4692\/revisions\/4720"}],"wp:attachment":[{"href":"https:\/\/www.technicost.com\/fr\/wp-json\/wp\/v2\/media?parent=4692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technicost.com\/fr\/wp-json\/wp\/v2\/categories?post=4692"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technicost.com\/fr\/wp-json\/wp\/v2\/tags?post=4692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}