{"id":8879,"date":"2021-07-02T08:45:07","date_gmt":"2021-07-02T08:45:07","guid":{"rendered":"https:\/\/www.thegreenbow.com\/?page_id=8879"},"modified":"2021-09-14T19:53:50","modified_gmt":"2021-09-14T17:53:50","slug":"subcontracting","status":"publish","type":"page","link":"https:\/\/www.thegreenbow.com\/en\/vpn-use-cases\/subcontracting\/","title":{"rendered":"Subcontracting"},"content":{"rendered":"\n<section  class=\"wp-block-acf-news-page-banner  post\" >\n  \n    <div class=\"section-content section-banner has-white-color img-align-center img-align-center\"  data-interchange=\"[https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-header-cas-usage-min-768x400.jpg, small], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-header-cas-usage-min-1024x1024.jpg, medium], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-header-cas-usage-min-1366x218.jpg, large], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-header-cas-usage-min-e1668089474873.jpg, xlarge], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-header-cas-usage-min-1366x712.jpg, retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-header-cas-usage-min-1366x1366.jpg, medium_retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-header-cas-usage-min-e1668089474873.jpg, large_retina]\" data-interchange-sizes=\"{&quot;small&quot;:{&quot;w&quot;:768,&quot;h&quot;:400},&quot;medium&quot;:{&quot;w&quot;:1024,&quot;h&quot;:1024},&quot;large&quot;:{&quot;w&quot;:1366,&quot;h&quot;:218},&quot;xlarge&quot;:{&quot;w&quot;:1470,&quot;h&quot;:235},&quot;retina&quot;:{&quot;w&quot;:1366,&quot;h&quot;:712},&quot;medium_retina&quot;:{&quot;w&quot;:1366,&quot;h&quot;:1366},&quot;large_retina&quot;:{&quot;w&quot;:1470,&quot;h&quot;:235},&quot;xlarge_retina&quot;:{&quot;w&quot;:1470,&quot;h&quot;:235}}\" >\n\n              <h1 class=\"page-title\">Subcontracting<\/h1>\n      \n    <\/div>\n\n  \n  \n  \n<\/section>\n\n\n<section class=\"block-grid-wrapper block-grid-for-core-heading\">\n      <div class=\"default-editor-content grid-for-core-heading grid-container\">\n        <div class=\"grid-x grid-padding-x align-center\">\n          <div class=\"cell\">\n            \n<h2 class=\"has-text-align-center wp-block-heading\">Controlling access to your organization<\/h2>\n          <\/div>\n        <\/div>\n      <\/div>\n\n      <\/section>\n\n<section  class=\"wp-block-acf-introduction is-style-variation-section-introduction section-content section-introduction\" itemprop=\"hasPart\" itemscope itemtype=\"https:\/\/schema.org\/WebPageElement\">\n  <div class=\"grid-container\">\n    <div class=\"grid-x grid-padding-x align-center\">\n      <div class=\"cell large-10\">\n        \n\n<p>The growing trend of subcontracting leads service providers to perform tasks within the company&#8217;s walls or in outdoor premises. Subcontracted developers, engineers, and consultants often need to <strong>access extremely critical resources<\/strong> from their workstations. The <strong>confidentiality<\/strong> of R&amp;D projects and hence controlling access to your organization become a major issue.<\/p>\n\n      <\/div>\n    <\/div>\n  <\/div>\n<\/section>\n\n\n<section class=\"block-grid-wrapper block-grid-for-core-media-text\">\n      <div class=\"default-editor-content grid-for-core-media-text grid-container\">\n        <div class=\"grid-x grid-padding-x align-center\">\n          <div class=\"cell\">\n            \n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Prestataire-1024x683.jpeg\" alt=\"Travailleur nomade\" class=\"wp-image-8913 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Prestataire-1024x683.jpeg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Prestataire-300x200.jpeg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Prestataire-768x513.jpeg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Prestataire-1536x1025.jpeg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Prestataire-2048x1367.jpeg 2048w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Prestataire-100x67.jpeg 100w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Prestataire-301x201.jpeg 301w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Prestataire-343x229.jpeg 343w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Cyberattacks against the business ecosystem of major corporations are on the rise. This particularly applies to <strong>their subcontractors<\/strong> or <strong>their service providers<\/strong>, such as IT services and consulting firms, internet service providers and facility management companies.<\/p>\n\n\n\n<p>Smaller businesses are no exception to this trend. They are increasingly targeted by hackers, who exploit their security vulnerabilities to then gain access to larger corporations.<\/p>\n<\/div><\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n\n      <\/section>\n\n<section class=\"block-grid-wrapper block-grid-for-core-media-text\">\n      <div class=\"default-editor-content grid-for-core-media-text grid-container\">\n        <div class=\"grid-x grid-padding-x align-center\">\n          <div class=\"cell\">\n            \n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile is-vertically-aligned-top\" style=\"grid-template-columns:auto 45%\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Cyber-Attaque-1024x576.jpeg\" alt=\"Cyber attaque\" class=\"wp-image-8883 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Cyber-Attaque-1024x576.jpeg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Cyber-Attaque-300x169.jpeg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Cyber-Attaque-768x432.jpeg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Cyber-Attaque-1536x864.jpeg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Cyber-Attaque-2048x1152.jpeg 2048w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Cyber-Attaque-100x56.jpeg 100w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Given this context, CISOs tremble at the idea of needing to grant access to the information system on workstations that are not under the company\u2019s control. <\/p>\n\n\n\n<p>To prevent <strong>data interception<\/strong> and above all to partition its information system and keep subcontractor access contained within a restricted perimeter, an ordering party may force its subcontractors to deploy a VPN client under its control.<\/p>\n\n\n\n<p>This enables administrators <strong>to restrict third party access<\/strong> to its information system.<\/p>\n<\/div><\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n\n      <\/section>\n\n<section class=\"block-grid-wrapper block-grid-for-core-heading\">\n      <div class=\"default-editor-content grid-for-core-heading grid-container\">\n        <div class=\"grid-x grid-padding-x align-center\">\n          <div class=\"cell\">\n            \n<h2 class=\"wp-block-heading\">Our solution<\/h2>\n          <\/div>\n        <\/div>\n      <\/div>\n\n      <\/section>\n\n<section class=\"block-grid-wrapper block-grid-for-core-paragraph\">\n      <div class=\"default-editor-content grid-for-core-paragraph grid-container\">\n        <div class=\"grid-x grid-padding-x align-center\">\n          <div class=\"cell\">\n            \n<p>AOpening a specific tunnel establishes a <strong>secure and exclusive connection<\/strong> with subcontractors. Administrators can thus grant restricted access to internal resources on workstations equipped with a VPN client that they have configured with digital protocols and certificates entirely under their control.<\/p>\n          <\/div>\n        <\/div>\n      <\/div>\n\n      <\/section>\n\n<section class=\"block-grid-wrapper block-grid-for-core-image\">\n      <div class=\"default-editor-content grid-for-core-image grid-container\">\n        <div class=\"grid-x grid-padding-x align-center\">\n          <div class=\"cell\">\n            \n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"266\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/07\/Schema-VPN-EN-1-1024x266.png\" alt=\"What is a VPN?\" class=\"wp-image-9639\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/07\/Schema-VPN-EN-1-1024x266.png 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/07\/Schema-VPN-EN-1-300x78.png 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/07\/Schema-VPN-EN-1-768x199.png 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/07\/Schema-VPN-EN-1-1536x399.png 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/07\/Schema-VPN-EN-1-2048x531.png 2048w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/07\/Schema-VPN-EN-1-100x26.png 100w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n          <\/div>\n        <\/div>\n      <\/div>\n\n      <\/section>\n\n<section class=\"block-grid-wrapper block-grid-for-core-paragraph\">\n      <div class=\"default-editor-content grid-for-core-paragraph grid-container\">\n        <div class=\"grid-x grid-padding-x align-center\">\n          <div class=\"cell\">\n            \n<p>A major player in VPN technologies, TheGreenBow has developed a range of VPN clients that enables ordering parties to protect connections from workstations (Windows, macOs, Linux), smartphones, and tablets (Android, iOS) to their information system.<\/p>\n          <\/div>\n        <\/div>\n      <\/div>\n\n      <\/section>\n\n<section class=\"valorisation-contenu-section\" style=\"background-color:#f5f5f5\" itemprop=\"hasPart\" itemscope itemtype=\"https:\/\/schema.org\/WebPageElement\">\n  <div class=\"wp-block-valorisation-contenu-section\">\n    <div class=\"grid-container\">\n      <div class=\"grid-x grid-padding-x align-center\">\n        <div class=\"cell large-10 text-center\">\n          \n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>Why choose TheGreenBow<\/strong><\/h2>\n\n\n\n<p class=\"has-text-align-center\">TheGreenBow VPN Clients are renowned for their robustness, ease of installation, and ease of use.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Securite.png\" alt=\"\" class=\"wp-image-7260\" width=\"77\" height=\"98\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Securite.png 102w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Securite-100x127.png 100w\" sizes=\"auto, (max-width: 77px) 100vw, 77px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"has-text-align-left\"><strong>S\u00e9curity<\/strong>: The French National Cybersecurity Agency (ANSSI) has issued several certifications, called security visas, for TheGreenBow products, a clear sign of our commitment to providing trusted VPN solutions that rely on the most advanced encryption algorithms and authentication systems on the market.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Facilite-2.png\" alt=\"\" class=\"wp-image-7270\" width=\"98\" height=\"98\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Facilite-2.png 130w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/Facilite-2-100x100.png 100w\" sizes=\"auto, (max-width: 98px) 100vw, 98px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"has-text-align-left\"><strong><strong>Easy installation<\/strong><\/strong>: We keep administrators in mind and aim to make their lives easier by providing numerous configuration and deployment options in our VPN clients.<\/p>\n\n\n\n<p><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/07\/Simplicite.png\" alt=\"thegreenbow-cas-usage-simplicite-utilisation\" class=\"wp-image-9593\" width=\"96\" height=\"98\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/07\/Simplicite.png 128w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/07\/Simplicite-100x102.png 100w\" sizes=\"auto, (max-width: 96px) 100vw, 96px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"has-text-align-left\"><strong><strong>Ease of use<\/strong><\/strong>: For protection to be truly effective, it must actually be implemented! Our software is extremely easy to use. We make sure users can carry out their tasks and actions in as few steps as possible, so that they can use their VPN client in a seamless and transparent manner.<\/p>\n<\/div>\n<\/div>\n\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/section>\n\n\n\n  <section class=\"linked-page-section\" itemprop=\"hasPart\" itemscope itemtype=\"https:\/\/schema.org\/WebPageElement\">\n    <div class=\"grid-container\">\n      <div class=\"grid-x grid-padding-x align-center\">\n        <div class=\"cell large-6 text-center\">\n          <div class=\"bkg-wrapper\">\n            <a href=\"https:\/\/www.thegreenbow.com\/en\/vpn-use-cases\/\" target=\"_self\">\n                              <figure class=\"page-image-1\">\n                  <img decoding=\"async\"  data-fade-in loading=\"lazy\" src=\"data:image\/png;base64,R0lGODlhAQABAAD\/ACwAAAAAAQABAAACADs=\" data-lazy-interchange=\"[https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-header-cas-usage-min-335x125.jpg, small], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-header-cas-usage-min-536x200.jpg, xlarge], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-header-cas-usage-min-670x250.jpg, retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-header-cas-usage-min-1072x400.jpg, medium_retina]\" data-interchange-sizes=\"{&quot;small&quot;:{&quot;w&quot;:335,&quot;h&quot;:125},&quot;xlarge&quot;:{&quot;w&quot;:536,&quot;h&quot;:200},&quot;retina&quot;:{&quot;w&quot;:670,&quot;h&quot;:250},&quot;medium_retina&quot;:{&quot;w&quot;:1072,&quot;h&quot;:400},&quot;xlarge_retina&quot;:{&quot;w&quot;:1072,&quot;h&quot;:400}}\"  alt=\"Subcontracting\" itemprop=\"image\" data-fade-in \/>\n                <\/figure>\n              \n              <h2 itemprop=\"name\">All use cases<\/h2>\n            <\/a>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/section>\n","protected":false},"excerpt":{"rendered":"<p>Controlling access to your organization Cyberattacks against the business ecosystem of major corporations are on the rise. This particularly applies to their subcontractors or their service providers, such as IT services and consulting firms, internet service providers and facility management companies. Smaller businesses are no exception to this trend. They are increasingly targeted by hackers, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":2022,"menu_order":38,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"resource_type":"internal","footnotes":""},"class_list":["post-8879","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Subcontracting - TheGreenBow<\/title>\n<meta name=\"description\" content=\"Subcontracted developers, engineers, and consultants often need to access extremely critical resources from their workstations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.thegreenbow.com\/en\/vpn-use-cases\/subcontracting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Subcontracting - TheGreenBow\" \/>\n<meta property=\"og:description\" content=\"Subcontracted developers, engineers, and consultants often need to access extremely critical resources from their workstations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thegreenbow.com\/en\/vpn-use-cases\/subcontracting\/\" \/>\n<meta property=\"og:site_name\" content=\"TheGreenBow\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-14T17:53:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Prestataire-1024x683.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@thegreenbow\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/vpn-use-cases\\\/subcontracting\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/vpn-use-cases\\\/subcontracting\\\/\",\"name\":\"Subcontracting - TheGreenBow\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/vpn-use-cases\\\/subcontracting\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/vpn-use-cases\\\/subcontracting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Prestataire-1024x683.jpeg\",\"datePublished\":\"2021-07-02T08:45:07+00:00\",\"dateModified\":\"2021-09-14T17:53:50+00:00\",\"description\":\"Subcontracted developers, engineers, and consultants often need to access extremely critical resources from their workstations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/vpn-use-cases\\\/subcontracting\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/vpn-use-cases\\\/subcontracting\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/vpn-use-cases\\\/subcontracting\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Prestataire-1024x683.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Prestataire-1024x683.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/vpn-use-cases\\\/subcontracting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Use cases\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/vpn-use-cases\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Subcontracting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\",\"name\":\"TheGreenBow\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#organization\",\"name\":\"TheGreenBow\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"width\":422,\"height\":84,\"caption\":\"TheGreenBow\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/thegreenbow\",\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/thegreenbow\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCZKtI7_fmgFcmovgGSy8AnQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Subcontracting - TheGreenBow","description":"Subcontracted developers, engineers, and consultants often need to access extremely critical resources from their workstations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.thegreenbow.com\/en\/vpn-use-cases\/subcontracting\/","og_locale":"en_US","og_type":"article","og_title":"Subcontracting - TheGreenBow","og_description":"Subcontracted developers, engineers, and consultants often need to access extremely critical resources from their workstations.","og_url":"https:\/\/www.thegreenbow.com\/en\/vpn-use-cases\/subcontracting\/","og_site_name":"TheGreenBow","article_modified_time":"2021-09-14T17:53:50+00:00","og_image":[{"url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Prestataire-1024x683.jpeg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@thegreenbow","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.thegreenbow.com\/en\/vpn-use-cases\/subcontracting\/","url":"https:\/\/www.thegreenbow.com\/en\/vpn-use-cases\/subcontracting\/","name":"Subcontracting - TheGreenBow","isPartOf":{"@id":"https:\/\/www.thegreenbow.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thegreenbow.com\/en\/vpn-use-cases\/subcontracting\/#primaryimage"},"image":{"@id":"https:\/\/www.thegreenbow.com\/en\/vpn-use-cases\/subcontracting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Prestataire-1024x683.jpeg","datePublished":"2021-07-02T08:45:07+00:00","dateModified":"2021-09-14T17:53:50+00:00","description":"Subcontracted developers, engineers, and consultants often need to access extremely critical resources from their workstations.","breadcrumb":{"@id":"https:\/\/www.thegreenbow.com\/en\/vpn-use-cases\/subcontracting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thegreenbow.com\/en\/vpn-use-cases\/subcontracting\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.thegreenbow.com\/en\/vpn-use-cases\/subcontracting\/#primaryimage","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Prestataire-1024x683.jpeg","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/06\/Prestataire-1024x683.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.thegreenbow.com\/en\/vpn-use-cases\/subcontracting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.thegreenbow.com\/en\/"},{"@type":"ListItem","position":2,"name":"Use cases","item":"https:\/\/www.thegreenbow.com\/en\/vpn-use-cases\/"},{"@type":"ListItem","position":3,"name":"Subcontracting"}]},{"@type":"WebSite","@id":"https:\/\/www.thegreenbow.com\/en\/#website","url":"https:\/\/www.thegreenbow.com\/en\/","name":"TheGreenBow","description":"","publisher":{"@id":"https:\/\/www.thegreenbow.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thegreenbow.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.thegreenbow.com\/en\/#organization","name":"TheGreenBow","url":"https:\/\/www.thegreenbow.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.thegreenbow.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","width":422,"height":84,"caption":"TheGreenBow"},"image":{"@id":"https:\/\/www.thegreenbow.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/thegreenbow","https:\/\/fr.linkedin.com\/company\/thegreenbow","https:\/\/www.youtube.com\/channel\/UCZKtI7_fmgFcmovgGSy8AnQ"]}]}},"_links":{"self":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/pages\/8879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/comments?post=8879"}],"version-history":[{"count":18,"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/pages\/8879\/revisions"}],"predecessor-version":[{"id":10996,"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/pages\/8879\/revisions\/10996"}],"up":[{"embeddable":true,"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/pages\/2022"}],"wp:attachment":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/media?parent=8879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}