{"id":1992,"date":"2020-08-12T12:43:21","date_gmt":"2020-08-12T12:43:21","guid":{"rendered":"https:\/\/www.regdata.ch\/solutions\/cas-dusage\/"},"modified":"2022-01-28T16:40:14","modified_gmt":"2022-01-28T16:40:14","slug":"by-usage","status":"publish","type":"page","link":"https:\/\/www.regdata.ch\/en\/product\/by-usage\/","title":{"rendered":"By Usage"},"content":{"rendered":"<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/06\/Hexagone_003-modifie.png\" alt=\"\"><\/p>\n<div><a href=\"#\">RPS addresses<br \/>5 major <span class=\"uk-text-primary\">uses<\/span>:<\/a><\/div>\n<p><a href=\"#suite\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/09\/fleche_bas.png\" alt=\"\"><\/a><\/p>\n<div>\n<h2>Protection for the Cloud<\/h2>\n<p>01<\/p>\n<div>\n<p style=\"text-align: justify;\">Don&#8217;t waste another moment fearing the Cloud.<br \/>Apply a Zero Trust paradigm towards public Cloud providers and\/or SaaS publishers. All your confidential data is protected, traced exclusively by you.<\/p>\n<\/div>\n<p><a href=\"\/en\/product\/by-usage\/protection-for-the-cloud\">Learn more&#8230;<\/a><\/p>\n<\/div>\n<div>\n<h2>Protection for applications in production <\/h2>\n<p>02<\/p>\n<div>\n<p style=\"text-align: justify;\">Protect your internal legacy, hybrid cloud, and SaaS cloud applications without impacting their performance and while preserving their usability.<\/p>\n<p style=\"text-align: justify;\">Minimize your risk of data leakage through database administrators, internal super users or part of a third-party company such as a SaaS provider or an ICT company.<\/p>\n<\/div>\n<p><a href=\"\/en\/product\/by-usage\/protection-for-applications-in-production\">Learn more&#8230;<\/a><\/p>\n<\/div>\n<div>\n<h2> Protection for areas in testing and development<\/h2>\n<p>03<\/p>\n<div>\n<p style=\"text-align: justify;\">Don&#8217;t let third-party companies in charge of your testing and development have access to your confidential and\/or sensitive personal data.<\/p>\n<p style=\"text-align: justify;\">Minimize your risk of data leakage via third-party companies, as well as your risk of non-compliance (EU-GDPR, FINMA).<\/p>\n<\/div>\n<p><a href=\"\/en\/product\/by-usage\/protection-for-areas-in-testing-and-development\">Learn more&#8230;<\/a><\/p>\n<\/div>\n<div>\n<h2>Protection for business process outsourcing<\/h2>\n<p>04<\/p>\n<div>\n<p style=\"text-align: justify;\">Benefit from a trustworthy platform (RPS) that will guarantee only people with clearance to process your confidential data will be able to view your data clearly, whether processing in an IT-Application or Business Process Outsourcing (BPO) mode.<\/p>\n<\/div>\n<p><a href=\"\/en\/product\/by-usage\/protection-for-process-outsourcing\">Learn more&#8230;<\/a><\/p>\n<\/div>\n<div>\n<h2>Protection for in-depth analysis <\/h2>\n<p>05<\/p>\n<div>\n<p style=\"text-align: justify;\">Allow for mass, in-depth analysis of your data (Machine learning-AI, Big Data analytics) in a secure manner and in accordance with current regulations.<\/p>\n<\/div>\n<p><a href=\"\/en\/product\/by-usage\/protection-for-in-depth-analysis\">Learn more&#8230;<\/a><\/p>\n<\/div>\n<hr>\n<h2><a href=\"\/en\/free-trial\">Request <br class=\"uk-visible@s\" \/><span class=\"uk-text-primary\">a Free Trial&nbsp;&nbsp; <img decoding=\"async\" class=\"alignnone size-full wp-image-123\" src=\"\/wp-content\/uploads\/2020\/06\/goto_try_it.png\" alt=\"\" width=\"80\" \/><\/span><\/a><\/h2>\n<hr>\n<p><!-- {\"name\":\"Solutions par types de services\",\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"style\":\"default\",\"width\":\"\",\"vertical_align\":\"middle\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"title_breakpoint\":\"xl\",\"image_position\":\"center-left\",\"width_expand\":\"left\",\"height\":\"full\",\"padding\":\"large\",\"animation\":\"slide-left-medium\",\"image\":\"\",\"image_size\":\"contain\",\"padding_remove_bottom\":false,\"padding_remove_top\":true,\"animation_delay\":true},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"1-3,2-3\",\"width_expand\":\"left\",\"height\":\"full\",\"column_gap\":\"collapse\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-left\",\"media_overlay_gradient\":\"\",\"vertical_align\":\"middle\",\"image\":\"\",\"image_size\":\"contain\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"image\",\"props\":{\"margin\":\"default\",\"image_svg_color\":\"emphasis\",\"image\":\"wp-content\\\/uploads\\\/2020\\\/06\\\/Hexagone_003-modifie.png\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"title_element\":\"div\",\"title_style\":\"heading-2xlarge\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\",\"animation\":\"slide-bottom-medium\",\"content\":\"RPS addresses<br \\\/>5 major <span class=\\\"uk-text-primary\\\">uses<\\\/span>:\",\"parallax_viewport\":\"0.25\",\"parallax_y_start\":\"4vh\",\"link\":\"#\",\"css\":\".el-element {padding:0;line-height:1.2em}\"}},{\"type\":\"image\",\"props\":{\"margin\":\"large\",\"image_svg_color\":\"emphasis\",\"position\":\"relative\",\"maxwidth\":\"2xlarge\",\"text_align\":\"center\",\"image\":\"wp-content\\\/uploads\\\/2020\\\/09\\\/fleche_bas.png\",\"position_left\":\"-100\",\"link\":\"#suite\",\"image_width\":\"50\"},\"name\":\"fleche-bas\"}]}]}],\"name\":\"Accueil\"},{\"type\":\"section\",\"props\":{\"style\":\"default\",\"width\":\"default\",\"vertical_align\":\"middle\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"title_breakpoint\":\"xl\",\"image_position\":\"center-center\",\"id\":\"suite\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\",\"margin\":\"small\",\"match\":true},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"link_text\":\"Learn more...\",\"title_hover_style\":\"reset\",\"title_element\":\"h2\",\"title_align\":\"top\",\"title_grid_width\":\"1-2\",\"meta_style\":\"heading-2xlarge\",\"meta_align\":\"above-title\",\"image_align\":\"top\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link_style\":\"text\",\"margin\":\"default\",\"panel_style\":\"card-default\",\"title_style\":\"heading-xlarge\",\"meta_color\":\"primary\",\"content_margin\":\"medium\",\"link_margin\":\"large\",\"maxwidth\":\"large\",\"animation\":\"none\",\"meta\":\"01\",\"title\":\"Protection for the Cloud\",\"content\":\"\n\n<p style=\\\"text-align: justify;\\\">Don't waste another moment fearing the Cloud.<br \\\/>Apply a Zero Trust paradigm towards public Cloud providers and\\\/or SaaS publishers. All your confidential data is protected, traced exclusively by you.<\\\/p>\",\"link\":\"en\\\/product\\\/by-usage\\\/protection-for-the-cloud\\\/\",\"parallax_breakpoint\":\"m\",\"title_grid_breakpoint\":\"m\",\"image_grid_breakpoint\":\"m\",\"css\":\".el-meta {text-decoration:underline;text-underline-position: under;}\\n\\n.el-link {position:absolute;bottom:40px;}\",\"id\":\"cas01\",\"panel_link\":true,\"icon_width\":80,\"meta_element\":\"div\",\"content_column_breakpoint\":\"m\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"link_text\":\"Learn more...\",\"title_hover_style\":\"reset\",\"title_element\":\"h2\",\"title_align\":\"top\",\"title_grid_width\":\"1-2\",\"meta_style\":\"heading-2xlarge\",\"meta_align\":\"above-title\",\"image_align\":\"top\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link_style\":\"text\",\"margin\":\"default\",\"panel_style\":\"card-default\",\"title_style\":\"heading-xlarge\",\"meta_color\":\"primary\",\"content_margin\":\"medium\",\"link_margin\":\"large\",\"maxwidth\":\"large\",\"text_align\":\"left\",\"animation\":\"none\",\"meta\":\"02\",\"title\":\"Protection for applications in production \",\"content\":\"\n\n<p style=\\\"text-align: justify;\\\">Protect your internal legacy, hybrid cloud, and SaaS cloud applications without impacting their performance and while preserving their usability.<\\\/p>\\n\n\n<p style=\\\"text-align: justify;\\\">Minimize your risk of data leakage through database administrators, internal super users or part of a third-party company such as a SaaS provider or an ICT company.<\\\/p>\",\"link\":\"en\\\/product\\\/by-usage\\\/protection-for-applications-in-production\\\/\",\"parallax_breakpoint\":\"m\",\"title_grid_breakpoint\":\"m\",\"image_grid_breakpoint\":\"m\",\"css\":\".el-meta {text-decoration:underline;text-underline-position: under;}\\n.el-link {position:absolute;bottom:40px;}\",\"id\":\"cas02\",\"panel_link\":true,\"icon_width\":80,\"meta_element\":\"div\",\"content_column_breakpoint\":\"m\"}}]}]},{\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\",\"margin\":\"medium\",\"match\":true},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"link_text\":\"Learn more...\",\"title_hover_style\":\"reset\",\"title_element\":\"h2\",\"title_align\":\"top\",\"title_grid_width\":\"1-2\",\"meta_style\":\"heading-2xlarge\",\"meta_align\":\"above-title\",\"image_align\":\"top\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link_style\":\"text\",\"margin\":\"default\",\"panel_style\":\"card-default\",\"title_style\":\"heading-xlarge\",\"meta_color\":\"primary\",\"content_margin\":\"medium\",\"link_margin\":\"large\",\"maxwidth\":\"large\",\"animation\":\"none\",\"meta\":\"03\",\"title\":\" Protection for areas in testing and development\",\"content\":\"\n\n<p style=\\\"text-align: justify;\\\">Don't let third-party companies in charge of your testing and development have access to your confidential and\\\/or sensitive personal data.<\\\/p>\\n\n\n<p style=\\\"text-align: justify;\\\">Minimize your risk of data leakage via third-party companies, as well as your risk of non-compliance (EU-GDPR, FINMA).<\\\/p>\",\"link\":\"en\\\/product\\\/by-usage\\\/protection-for-areas-in-testing-and-development\\\/\",\"parallax_breakpoint\":\"m\",\"title_grid_breakpoint\":\"m\",\"image_grid_breakpoint\":\"m\",\"css\":\".el-meta {text-decoration:underline;text-underline-position: under;}\\n.el-link {position:absolute;bottom:40px;}\",\"id\":\"cas03\",\"panel_link\":true,\"icon_width\":80,\"meta_element\":\"div\",\"content_column_breakpoint\":\"m\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"link_text\":\"Learn more...\",\"title_hover_style\":\"reset\",\"title_element\":\"h2\",\"title_align\":\"top\",\"title_grid_width\":\"1-2\",\"meta_style\":\"heading-2xlarge\",\"meta_align\":\"above-title\",\"image_align\":\"top\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link_style\":\"text\",\"margin\":\"default\",\"panel_style\":\"card-default\",\"title_style\":\"heading-xlarge\",\"meta_color\":\"primary\",\"content_margin\":\"medium\",\"link_margin\":\"large\",\"maxwidth\":\"large\",\"text_align\":\"left\",\"animation\":\"none\",\"meta\":\"04\",\"title\":\"Protection for business process outsourcing\",\"content\":\"\n\n<p style=\\\"text-align: justify;\\\">Benefit from a trustworthy platform (RPS) that will guarantee only people with clearance to process your confidential data will be able to view your data clearly, whether processing in an IT-Application or Business Process Outsourcing (BPO) mode.<\\\/p>\",\"link\":\"en\\\/product\\\/by-usage\\\/protection-for-process-outsourcing\\\/\",\"parallax_breakpoint\":\"m\",\"title_grid_breakpoint\":\"m\",\"image_grid_breakpoint\":\"m\",\"css\":\".el-meta {text-decoration:underline;text-underline-position: under;}\\n.el-link {position:absolute;bottom:40px;}\",\"id\":\"cas04\",\"panel_link\":true,\"icon_width\":80,\"meta_element\":\"div\",\"content_column_breakpoint\":\"m\"}}]}]},{\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\",\"margin\":\"medium\",\"match\":true},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"link_text\":\"Learn more...\",\"title_hover_style\":\"reset\",\"title_element\":\"h2\",\"title_align\":\"top\",\"title_grid_width\":\"1-2\",\"meta_style\":\"heading-2xlarge\",\"meta_align\":\"above-title\",\"image_align\":\"top\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link_style\":\"text\",\"margin\":\"default\",\"panel_style\":\"card-default\",\"title_style\":\"heading-xlarge\",\"meta_color\":\"primary\",\"content_margin\":\"medium\",\"link_margin\":\"large\",\"maxwidth\":\"large\",\"animation\":\"none\",\"meta\":\"05\",\"title\":\"Protection for in-depth analysis \",\"content\":\"\n\n<p style=\\\"text-align: justify;\\\">Allow for mass, in-depth analysis of your data (Machine learning-AI, Big Data analytics) in a secure manner and in accordance with current regulations.<\\\/p>\",\"link\":\"en\\\/product\\\/by-usage\\\/protection-for-in-depth-analysis\\\/\",\"parallax_breakpoint\":\"m\",\"title_grid_breakpoint\":\"m\",\"image_grid_breakpoint\":\"m\",\"css\":\".el-meta {text-decoration:underline;text-underline-position: under;}\\n.el-link {position:absolute;bottom:40px;}\",\"id\":\"cas05\",\"panel_link\":true,\"icon_width\":80,\"meta_element\":\"div\",\"content_column_breakpoint\":\"m\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_medium\":\"1-2\"},\"children\":[]}]}]},{\"type\":\"section\",\"props\":{\"style\":\"default\",\"width\":\"default\",\"vertical_align\":\"middle\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"title_breakpoint\":\"xl\",\"image_position\":\"center-center\",\"padding_remove_top\":false},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"expand,large\",\"margin\":\"medium\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_small\":\"expand\"},\"children\":[]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"vertical_align\":\"bottom\",\"width_small\":\"large\"},\"children\":[{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"\",\"divider_align\":\"\",\"divider_align_breakpoint\":\"\",\"divider_align_fallback\":\"\"}},{\"type\":\"headline\",\"props\":{\"title_element\":\"h2\",\"title_style\":\"heading-large\",\"content\":\"Request <br class=\\\"uk-visible@s\\\" \\\/><span class=\\\"uk-text-primary\\\">a Free Trial&nbsp;&nbsp; <img class=\\\"alignnone size-full wp-image-123\\\" src=\\\"\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/goto_try_it.png\\\" alt=\\\"\\\" width=\\\"80\\\" \\\/><\\\/span>\",\"link\":\"en\\\/free-trial\\\/\",\"link_style\":false,\"link_target\":false}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"\",\"divider_align\":\"\",\"divider_align_breakpoint\":\"\",\"divider_align_fallback\":\"\"}}]}]}],\"name\":\"lets go essai\"}],\"version\":\"2.2.5\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>RPS addresses5 major uses: Protection for the Cloud 01 Don&#8217;t waste another moment fearing the Cloud.Apply a Zero Trust paradigm towards public Cloud providers and\/or SaaS publishers. All your confidential data is protected, traced exclusively by you. Learn more&#8230; Protection for applications in production 02 Protect your internal legacy, hybrid cloud, and SaaS cloud applications [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1857,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1992","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>By Usage - REGDATA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.regdata.ch\/en\/product\/by-usage\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"By Usage - REGDATA\" \/>\n<meta property=\"og:description\" content=\"RPS addresses5 major uses: Protection for the Cloud 01 Don&#8217;t waste another moment fearing the Cloud.Apply a Zero Trust paradigm towards public Cloud providers and\/or SaaS publishers. All your confidential data is protected, traced exclusively by you. Learn more&#8230; Protection for applications in production 02 Protect your internal legacy, hybrid cloud, and SaaS cloud applications [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.regdata.ch\/en\/product\/by-usage\/\" \/>\n<meta property=\"og:site_name\" content=\"REGDATA\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-28T16:40:14+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.regdata.ch\/en\/product\/by-usage\/\",\"url\":\"https:\/\/www.regdata.ch\/en\/product\/by-usage\/\",\"name\":\"By Usage - REGDATA\",\"isPartOf\":{\"@id\":\"https:\/\/www.regdata.ch\/en\/#website\"},\"datePublished\":\"2020-08-12T12:43:21+00:00\",\"dateModified\":\"2022-01-28T16:40:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.regdata.ch\/en\/product\/by-usage\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.regdata.ch\/en\/product\/by-usage\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.regdata.ch\/en\/product\/by-usage\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.regdata.ch\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Product\",\"item\":\"https:\/\/www.regdata.ch\/en\/product\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"By Usage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.regdata.ch\/en\/#website\",\"url\":\"https:\/\/www.regdata.ch\/en\/\",\"name\":\"REGDATA\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.regdata.ch\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.regdata.ch\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.regdata.ch\/en\/#organization\",\"name\":\"REGDATA SA\",\"url\":\"https:\/\/www.regdata.ch\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.regdata.ch\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/favicon.png\",\"contentUrl\":\"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/favicon.png\",\"width\":71,\"height\":71,\"caption\":\"REGDATA SA\"},\"image\":{\"@id\":\"https:\/\/www.regdata.ch\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"By Usage - REGDATA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.regdata.ch\/en\/product\/by-usage\/","og_locale":"en_US","og_type":"article","og_title":"By Usage - REGDATA","og_description":"RPS addresses5 major uses: Protection for the Cloud 01 Don&#8217;t waste another moment fearing the Cloud.Apply a Zero Trust paradigm towards public Cloud providers and\/or SaaS publishers. All your confidential data is protected, traced exclusively by you. Learn more&#8230; Protection for applications in production 02 Protect your internal legacy, hybrid cloud, and SaaS cloud applications [&hellip;]","og_url":"https:\/\/www.regdata.ch\/en\/product\/by-usage\/","og_site_name":"REGDATA","article_modified_time":"2022-01-28T16:40:14+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.regdata.ch\/en\/product\/by-usage\/","url":"https:\/\/www.regdata.ch\/en\/product\/by-usage\/","name":"By Usage - REGDATA","isPartOf":{"@id":"https:\/\/www.regdata.ch\/en\/#website"},"datePublished":"2020-08-12T12:43:21+00:00","dateModified":"2022-01-28T16:40:14+00:00","breadcrumb":{"@id":"https:\/\/www.regdata.ch\/en\/product\/by-usage\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.regdata.ch\/en\/product\/by-usage\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.regdata.ch\/en\/product\/by-usage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.regdata.ch\/en\/"},{"@type":"ListItem","position":2,"name":"Product","item":"https:\/\/www.regdata.ch\/en\/product\/"},{"@type":"ListItem","position":3,"name":"By Usage"}]},{"@type":"WebSite","@id":"https:\/\/www.regdata.ch\/en\/#website","url":"https:\/\/www.regdata.ch\/en\/","name":"REGDATA","description":"","publisher":{"@id":"https:\/\/www.regdata.ch\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.regdata.ch\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.regdata.ch\/en\/#organization","name":"REGDATA SA","url":"https:\/\/www.regdata.ch\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.regdata.ch\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/favicon.png","contentUrl":"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/favicon.png","width":71,"height":71,"caption":"REGDATA SA"},"image":{"@id":"https:\/\/www.regdata.ch\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/pages\/1992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/comments?post=1992"}],"version-history":[{"count":26,"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/pages\/1992\/revisions"}],"predecessor-version":[{"id":2521,"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/pages\/1992\/revisions\/2521"}],"up":[{"embeddable":true,"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/pages\/1857"}],"wp:attachment":[{"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/media?parent=1992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}