{"id":14948,"date":"2024-03-02T13:03:00","date_gmt":"2024-03-02T13:03:00","guid":{"rendered":"https:\/\/ramsdata.com.pl\/opswat\/produits\/metadefender-cloud-ramsdata\/"},"modified":"2025-06-19T07:04:40","modified_gmt":"2025-06-19T07:04:40","slug":"metadefender-cloud-ramsdata","status":"publish","type":"page","link":"https:\/\/ramsdata.com.pl\/fr\/opswat\/produits\/metadefender-cloud-ramsdata\/","title":{"rendered":"MetaDefender Cloud-Ramsdata"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"14948\" class=\"elementor elementor-14948 elementor-9174\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1620f79a e-flex e-con-boxed e-con e-parent\" data-id=\"1620f79a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-184ec947 e-con-full e-flex e-con e-child\" data-id=\"184ec947\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a14ad55 elementor-widget elementor-widget-image\" data-id=\"5a14ad55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"145\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1024x185.webp\" class=\"attachment-large size-large wp-image-13341\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1024x185.webp 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-300x54.webp 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-768x139.webp 768w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1536x278.webp 1536w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-2048x371.webp 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5dd0d121 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"5dd0d121\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">MetaDefender Cloud<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d75eea2 e-flex e-con-boxed e-con e-parent\" data-id=\"5d75eea2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3abf00ce e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"3abf00ce\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7a376014 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"7a376014\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-111698d7 elementor-widget elementor-widget-heading\" data-id=\"111698d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">MetaDefender Cloud-Ramsdata<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c3b1b14 elementor-widget elementor-widget-text-editor\" data-id=\"2c3b1b14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Protection contre les menaces avanc\u00e9es et analyse des logiciels malveillants bas\u00e9es sur le cloud. L&rsquo;API MetaDefender Cloud fournit aux chercheurs en malware, aux \u00e9quipes de r\u00e9ponse aux incidents et aux fournisseurs de technologie des API compl\u00e8tes pour exploiter les technologies avanc\u00e9es de d\u00e9tection et de pr\u00e9vention des menaces.<\/p>\n<p>Gr\u00e2ce \u00e0 notre API REST, les entreprises peuvent facilement ajouter la d\u00e9tection et la pr\u00e9vention des menaces de cybers\u00e9curit\u00e9 bas\u00e9es sur le cloud avec Deep CDR et le multiscanning avec plus de 20 moteurs de protection contre les logiciels malveillants. Notre philosophie \u00ab\u00a0Ne faites pas confiance aux fichiers\u00a0\u00bb nous a amen\u00e9s \u00e0 d\u00e9velopper une plateforme en nuage con\u00e7ue pour prot\u00e9ger les organisations contre les attaques bas\u00e9es sur les fichiers.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-234a7ce elementor-widget elementor-widget-heading\" data-id=\"234a7ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Analyse des fichiers et des URL suspects<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17f9ee7 elementor-widget elementor-widget-text-editor\" data-id=\"17f9ee7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les fichiers restent le principal vecteur d&rsquo;attaque utilis\u00e9 aujourd&rsquo;hui. Les organisations qui utilisent des infrastructures critiques doivent prendre des mesures pr\u00e9ventives strictes dans le cadre de leurs activit\u00e9s quotidiennes pour se prot\u00e9ger contre les attaques. Les RSSI et les SOC sont confront\u00e9s \u00e0 de grands d\u00e9fis pour maintenir la s\u00e9curit\u00e9 de leur organisation \u00e0 jour en utilisant les meilleures pratiques les plus r\u00e9centes de l&rsquo;industrie. OPSWAT cr\u00e9e une technologie de pointe avec des fonctions de d\u00e9tection et de pr\u00e9vention des logiciels malveillants. MetaDefender Cloud met les technologies OPSWAT \u00e0 disposition dans un service cloud complet, rapide et hautement disponible.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e9acab6 e-flex e-con-boxed e-con e-parent\" data-id=\"3e9acab6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-36a3aa42 e-flex e-con-boxed e-con e-child\" data-id=\"36a3aa42\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5d640fcf e-con-full e-flex e-con e-child\" data-id=\"5d640fcf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-67340f92 e-flex e-con-boxed e-con e-child\" data-id=\"67340f92\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e1bb071 elementor-widget elementor-widget-image\" data-id=\"5e1bb071\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"54\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-300x54.webp\" class=\"attachment-medium size-medium wp-image-13341\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-300x54.webp 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1024x185.webp 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-768x139.webp 768w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1536x278.webp 1536w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-2048x371.webp 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dcfac60 e-flex e-con-boxed e-con e-child\" data-id=\"dcfac60\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-28e726c4 elementor-widget elementor-widget-text-editor\" data-id=\"28e726c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pr\u00e9sentation de MetaDefender Cloud &#8211; Technologie<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3f55c082 e-flex e-con-boxed e-con e-child\" data-id=\"3f55c082\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4adff38b elementor-widget elementor-widget-text-editor\" data-id=\"4adff38b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Multiscanning<\/strong><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3b8d385 e-flex e-con-boxed e-con e-child\" data-id=\"3b8d385\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6dcfbcd9 elementor-widget elementor-widget-text-editor\" data-id=\"6dcfbcd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Augmenter les taux de d\u00e9tection, r\u00e9duire les d\u00e9lais de d\u00e9tection des \u00e9pid\u00e9mies et assurer la r\u00e9silience avec les fournisseurs de logiciels de protection contre les logiciels malveillants. Analyse simultan\u00e9e \u00e0 l&rsquo;aide de plus de 20 moteurs de protection contre les logiciels malveillants, tels que McAfee, Kaspersky ou Bitdefender, \u00e0 l&rsquo;aide de signatures, d&rsquo;heuristiques et d&rsquo;apprentissage automatique.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fe075a elementor-widget elementor-widget-text-editor\" data-id=\"4fe075a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>CDR profond<\/strong><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd87f08 elementor-widget elementor-widget-text-editor\" data-id=\"bd87f08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pr\u00e9venir les attaques de type \u00ab\u00a0zero-day\u00a0\u00bb et les attaques cibl\u00e9es gr\u00e2ce \u00e0 la technologie Deep CDR d&rsquo;OPSWAT (la premi\u00e8re position dans l&rsquo;industrie). Nous supposons que tous les fichiers sont malveillants et propres et nous reconstruisons chaque fichier en conservant les m\u00eames donn\u00e9es visuelles avec un contenu s\u00fbr. Cette technologie est tr\u00e8s efficace pour pr\u00e9venir les menaces inconnues, y compris les attaques cibl\u00e9es de type \u00ab\u00a0jour z\u00e9ro\u00a0\u00bb et les menaces dot\u00e9es d&rsquo;une technologie d&rsquo;\u00e9vasion des logiciels malveillants.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-204cf74 elementor-widget elementor-widget-text-editor\" data-id=\"204cf74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5>Analyse dynamique dans un bac \u00e0 sable<\/h5>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22b02c4 elementor-widget elementor-widget-text-editor\" data-id=\"22b02c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Faire exploser des logiciels malveillants dans un environnement contr\u00f4l\u00e9 pour mettre en \u00e9vidence les comportements malveillants en enregistrant et en classant le comportement des fichiers. Tous les logiciels malveillants ne peuvent pas \u00eatre d\u00e9tect\u00e9s par des m\u00e9thodes statiques telles que le multiscanning, en particulier les nouveaux logiciels malveillants utilisant des attaques de type \u00ab\u00a0zero-day\u00a0\u00bb. OPSWAT Sandbox \u00e9tend les capacit\u00e9s de d\u00e9tection des malwares de MetaDefender Cloud, offrant aux organisations un ensemble complet d&rsquo;outils technologiques de s\u00e9curit\u00e9.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f82157 elementor-widget elementor-widget-text-editor\" data-id=\"0f82157\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5>Des m\u00e9tadonn\u00e9es riches<\/h5>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-204dfe3 elementor-widget elementor-widget-text-editor\" data-id=\"204dfe3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>MetaDefender Cloud analyse et extrait les m\u00e9tadonn\u00e9es des fichiers, fournissant ainsi au sp\u00e9cialiste des fichiers une base de donn\u00e9es compl\u00e8te. Le comit\u00e9 de s\u00e9curit\u00e9 acc\u00e8de aux informations qui r\u00e9v\u00e8lent des anomalies potentielles dans les fichiers ou des capacit\u00e9s malveillantes. Il s&rsquo;agit notamment des informations relatives au Portable Executable, des donn\u00e9es EXIF, du manifeste Android, etc.<\/p>\n<p>OPSWAT d\u00e9tecte et classe les fichiers en fonction des fournisseurs de logiciels et des produits, et combine les donn\u00e9es avec une base de donn\u00e9es de vuln\u00e9rabilit\u00e9s du NIST et des donn\u00e9es provenant de centaines de milliers de points d&rsquo;acc\u00e8s actifs utilisant MetaAccess.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-34bb9713 e-con-full e-flex e-con e-child\" data-id=\"34bb9713\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f1a4f1 elementor-widget elementor-widget-image\" data-id=\"1f1a4f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"497\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/cloud-multi-scanning.png-1024x636.webp\" class=\"attachment-large size-large wp-image-13571\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/cloud-multi-scanning.png-1024x636.webp 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/cloud-multi-scanning.png-300x186.webp 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/cloud-multi-scanning.png-768x477.webp 768w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/cloud-multi-scanning.png.webp 1192w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c2fa75 elementor-widget elementor-widget-image\" data-id=\"8c2fa75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"497\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/cloud-Deep-CDR.png-1024x636.webp\" class=\"attachment-large size-large wp-image-13576\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/cloud-Deep-CDR.png-1024x636.webp 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/cloud-Deep-CDR.png-300x186.webp 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/cloud-Deep-CDR.png-768x477.webp 768w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/cloud-Deep-CDR.png.webp 1192w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb2a88f elementor-widget elementor-widget-image\" data-id=\"cb2a88f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"511\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/cloud-sandbox_analysis.png-1024x654.webp\" class=\"attachment-large size-large wp-image-13581\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/cloud-sandbox_analysis.png-1024x654.webp 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/cloud-sandbox_analysis.png-300x192.webp 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/cloud-sandbox_analysis.png-768x490.webp 768w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/cloud-sandbox_analysis.png.webp 1267w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e2540ed e-flex e-con-boxed e-con e-parent\" data-id=\"3e2540ed\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7c645575 e-flex e-con-boxed e-con e-child\" data-id=\"7c645575\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-18ffd4d8 e-flex e-con-boxed e-con e-child\" data-id=\"18ffd4d8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca6e605 elementor-widget elementor-widget-image\" data-id=\"ca6e605\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1265\" height=\"597\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/05\/Use-malicious-uploadspl.png\" class=\"attachment-full size-full wp-image-19815\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/05\/Use-malicious-uploadspl.png 1265w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/05\/Use-malicious-uploadspl-300x142.png 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/05\/Use-malicious-uploadspl-1024x483.png 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/05\/Use-malicious-uploadspl-768x362.png 768w\" sizes=\"(max-width: 1265px) 100vw, 1265px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-16157b03 e-flex e-con-boxed e-con e-child\" data-id=\"16157b03\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25e90e7f elementor-widget elementor-widget-heading\" data-id=\"25e90e7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cas d'utilisation  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-531ec035 elementor-widget elementor-widget-text-editor\" data-id=\"531ec035\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Pr\u00e9vention des transferts de fichiers malveillants<\/h4>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ed785c0 elementor-widget elementor-widget-text-editor\" data-id=\"7ed785c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Emp\u00eacher la transmission de fichiers malveillants pour les applications web qui contournent les bacs \u00e0 sable et les solutions uniques de d\u00e9tection des logiciels malveillants.<\/p>\n<p>D\u00e9sarmement et reconstruction du contenu en profondeur (Deep CDR) : D\u00e9sarmement de plus de 90 types de fichiers courants et reconstruction de chaque fichier, pour une utilisation totale avec un contenu s\u00e9curis\u00e9.<\/p>\n<p>Analyse avec plus de 20 moteurs de protection contre les logiciels malveillants utilisant des signatures, des heuristiques et des technologies d&rsquo;apprentissage automatique pour d\u00e9tecter les menaces connues et inconnues le plus t\u00f4t et le plus efficacement possible.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ef85af3 e-flex e-con-boxed e-con e-child\" data-id=\"5ef85af3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-17ef2e81 e-flex e-con-boxed e-con e-child\" data-id=\"17ef2e81\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-774f059c elementor-widget elementor-widget-heading\" data-id=\"774f059c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Effectuez une analyse rapide et efficace des logiciels malveillants<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49b7ece2 elementor-widget elementor-widget-text-editor\" data-id=\"49b7ece2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Analyse rapide et efficace des logiciels malveillants. Les analystes de logiciels malveillants peuvent utiliser plus de 20 moteurs de protection contre les logiciels malveillants. La plateforme MetaDefender Cloud est facile \u00e0 licencier et offre une confidentialit\u00e9 totale des donn\u00e9es avec des options commerciales qui ne stockent pas les fichiers dans le nuage. Vos fichiers seront trait\u00e9s en priv\u00e9 dans un lieu de stockage temporaire et supprim\u00e9s imm\u00e9diatement apr\u00e8s l&rsquo;ach\u00e8vement du rapport d&rsquo;analyse.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-138ed8ca e-flex e-con-boxed e-con e-child\" data-id=\"138ed8ca\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ad064e9 elementor-widget elementor-widget-image\" data-id=\"6ad064e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1192\" height=\"740\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/use-malware-analysis.png.webp\" class=\"attachment-full size-full wp-image-13591\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/use-malware-analysis.png.webp 1192w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/use-malware-analysis.png-300x186.webp 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/use-malware-analysis.png-1024x636.webp 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/use-malware-analysis.png-768x477.webp 768w\" sizes=\"(max-width: 1192px) 100vw, 1192px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5bce0df e-flex e-con-boxed e-con e-parent\" data-id=\"5bce0df\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bbddb94 e-flex e-con-boxed e-con e-child\" data-id=\"bbddb94\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a659848 e-flex e-con-boxed e-con e-child\" data-id=\"a659848\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-36f9505 elementor-widget elementor-widget-image\" data-id=\"36f9505\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1192\" height=\"740\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/use-unknown-threats.png.webp\" class=\"attachment-full size-full wp-image-13596\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/use-unknown-threats.png.webp 1192w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/use-unknown-threats.png-300x186.webp 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/use-unknown-threats.png-1024x636.webp 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/use-unknown-threats.png-768x477.webp 768w\" sizes=\"(max-width: 1192px) 100vw, 1192px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9695740 e-flex e-con-boxed e-con e-child\" data-id=\"9695740\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d51437 elementor-widget elementor-widget-heading\" data-id=\"1d51437\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pr\u00e9venir les menaces inconnues gr\u00e2ce au CDR approfondi et au multiscanning<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71ab085 elementor-widget elementor-widget-text-editor\" data-id=\"71ab085\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ajouter des capacit\u00e9s de d\u00e9tection et de pr\u00e9vention des menaces avanc\u00e9es aux produits de cybers\u00e9curit\u00e9. Des fonctions li\u00e9es \u00e0 la r\u00e9putation peuvent \u00e9galement \u00eatre ajout\u00e9es aux solutions clients. Nous fournissons des exemples de code et une documentation d\u00e9taill\u00e9e sur l&rsquo;API pour vous aider \u00e0 mettre en place votre int\u00e9gration. Vous pouvez utiliser pratiquement n&rsquo;importe quel langage de programmation pour exploiter la technologie MetaDefender via nos API, et vos d\u00e9veloppeurs prototyperont facilement.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-da2407d e-flex e-con-boxed e-con e-child\" data-id=\"da2407d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-78d337a e-flex e-con-boxed e-con e-child\" data-id=\"78d337a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-522059e elementor-widget elementor-widget-heading\" data-id=\"522059e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Compl\u00e9tez votre plateforme d'analyse des menaces  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5e9efb elementor-widget elementor-widget-text-editor\" data-id=\"f5e9efb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L&rsquo;analyse de la menace commence par la collecte d&rsquo;informations. Depuis 2012, OPSWAT collecte des donn\u00e9es sur les logiciels malveillants \u00e0 partir de nombreuses sources diff\u00e9rentes : utilisateurs libres, clients, notre communaut\u00e9 d&rsquo;\u00e9quipementiers et d&rsquo;autres fournisseurs de cybers\u00e9curit\u00e9. Il en r\u00e9sulte une \u00e9norme base de donn\u00e9es en ligne de raccourcis et d&rsquo;informations sur les logiciels malveillants.<\/p>\n<p>La source de renseignements sur les menaces OPSWAT permet aux organisations d&rsquo;utiliser en temps r\u00e9el les donn\u00e9es sur les malwares collect\u00e9es par la plateforme MetaDefender Cloud dans le monde entier. Les organisations int\u00e8grent nos informations actualis\u00e9es sur les menaces aux outils ou solutions existants afin de prot\u00e9ger leur infrastructure contre les menaces.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b9b959 e-flex e-con-boxed e-con e-child\" data-id=\"6b9b959\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-adabe26 elementor-widget elementor-widget-image\" data-id=\"adabe26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1108\" height=\"597\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/05\/use-threat-intelligencepl.png\" class=\"attachment-full size-full wp-image-19822\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/05\/use-threat-intelligencepl.png 1108w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/05\/use-threat-intelligencepl-300x162.png 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/05\/use-threat-intelligencepl-1024x552.png 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/05\/use-threat-intelligencepl-768x414.png 768w\" sizes=\"(max-width: 1108px) 100vw, 1108px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6a85ee22 elementor-section-full_width elementor-section-stretched elementor-section-height-default elementor-section-height-default\" data-id=\"6a85ee22\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e487bbd\" data-id=\"1e487bbd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-269d6e65 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"269d6e65\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-35ac986b\" data-id=\"35ac986b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-561d505c elementor-widget elementor-widget-heading\" data-id=\"561d505c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PLATE-FORME D'ANALYSE DES RISQUES<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-134d0930 elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"134d0930\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-134d0930\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"134d0930\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"plus-de-40-milliards-de-hachages\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-3231\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Plus de 40 milliards de hachages<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-3231\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"plus-de-40-milliards-de-hachages\"><p>Depuis 2012, nous collectons des donn\u00e9es sur la r\u00e9putation des fichiers : les r\u00e9sultats du multiscanning et les m\u00e9tadonn\u00e9es des fichiers class\u00e9es par hachage MD5, SHA1 et SHA256 afin de cr\u00e9er un service complet de recherche de fichiers pour nos utilisateurs. Nous proposons des limites journali\u00e8res flexibles et notre API REST est simple et facile \u00e0 utiliser. Notre base de donn\u00e9es compte actuellement plus de 40 milliards d&rsquo;abr\u00e9viations.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"sources-dinformation-sur-les-risques\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-3232\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Sources d'information sur les risques<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-3232\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"sources-dinformation-sur-les-risques\"><p>Les canaux sont instantan\u00e9ment mis \u00e0 jour avec les derniers raccourcis de fichiers analys\u00e9s par notre plateforme \u00e0 partir d&rsquo;une vari\u00e9t\u00e9 de sources, y compris les logiciels de partage de logiciels malveillants, les fichiers clients et plus encore.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"ip-et-intelligence-des-domaines\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-3233\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">IP et intelligence des domaines<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-3233\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"ip-et-intelligence-des-domaines\"><p>En utilisant les m\u00eames principes de multiscanning, nous collectons des donn\u00e9es \u00e0 partir de plusieurs sources en ligne en temps r\u00e9el, sp\u00e9cialis\u00e9es dans les adresses IP, les domaines et la r\u00e9putation des URL, afin de fournir un service de recherche qui renvoie des r\u00e9sultats agr\u00e9g\u00e9s \u00e0 nos utilisateurs.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"dirig-par-la-communaut\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-3234\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Dirig\u00e9 par la communaut\u00e9<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-3234\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"dirig-par-la-communaut\"><p>MetaDefender Cloud est \u00e9galement disponible en tant que service gratuit pour les utilisateurs du monde entier, y compris les analystes et les sp\u00e9cialistes des malwares. Les professionnels de la s\u00e9curit\u00e9 qui souhaitent mettre en \u00e9vidence les logiciels malveillants cach\u00e9s dans les fichiers et les sites Internet. Nous encourageons notre communaut\u00e9 \u00e0 ajouter des fichiers et \u00e0 voter pour les r\u00e9sultats, et nous mettons ces informations \u00e0 la disposition de tous les utilisateurs.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fc8539d elementor-widget elementor-widget-image\" data-id=\"6fc8539d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"54\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/OPSWAT_Logo_CMYKwhite-768x139.png-300x54.webp\" class=\"attachment-medium size-medium wp-image-13021\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/OPSWAT_Logo_CMYKwhite-768x139.png-300x54.webp 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/OPSWAT_Logo_CMYKwhite-768x139.png.webp 768w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-8ca685d e-flex e-con-boxed e-con e-parent\" data-id=\"8ca685d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2e18662 e-flex e-con-boxed e-con e-child\" data-id=\"2e18662\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7a67f9b e-flex e-con-boxed e-con e-child\" data-id=\"7a67f9b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-755aa24 elementor-widget elementor-widget-image\" data-id=\"755aa24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"2350\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/10\/Metadefender-Platform-Cloud-Security-pop-1.jpg\" class=\"attachment-full size-full wp-image-30308\" alt=\"Metadefender-Platform-Cloud-Security-pop-1\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/10\/Metadefender-Platform-Cloud-Security-pop-1.jpg 1920w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/10\/Metadefender-Platform-Cloud-Security-pop-1-245x300.jpg 245w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/10\/Metadefender-Platform-Cloud-Security-pop-1-837x1024.jpg 837w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/10\/Metadefender-Platform-Cloud-Security-pop-1-768x940.jpg 768w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/10\/Metadefender-Platform-Cloud-Security-pop-1-1255x1536.jpg 1255w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/10\/Metadefender-Platform-Cloud-Security-pop-1-1673x2048.jpg 1673w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-606d48d e-flex e-con-boxed e-con e-child\" data-id=\"606d48d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df6f4d9 elementor-widget elementor-widget-image\" data-id=\"df6f4d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"2350\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/10\/Metadefender-Platform-Cloud-Security-pop-2.jpg\" class=\"attachment-full size-full wp-image-30314\" alt=\"Metadefender-Platform-Cloud-Security-pop-2\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/10\/Metadefender-Platform-Cloud-Security-pop-2.jpg 1920w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/10\/Metadefender-Platform-Cloud-Security-pop-2-245x300.jpg 245w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/10\/Metadefender-Platform-Cloud-Security-pop-2-837x1024.jpg 837w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/10\/Metadefender-Platform-Cloud-Security-pop-2-768x940.jpg 768w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/10\/Metadefender-Platform-Cloud-Security-pop-2-1255x1536.jpg 1255w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/10\/Metadefender-Platform-Cloud-Security-pop-2-1673x2048.jpg 1673w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>MetaDefender Cloud MetaDefender Cloud-Ramsdata Protection contre les menaces avanc\u00e9es et analyse des logiciels malveillants bas\u00e9es sur le cloud. L&rsquo;API MetaDefender Cloud fournit aux chercheurs en malware, aux \u00e9quipes de r\u00e9ponse aux incidents et aux fournisseurs de technologie des API compl\u00e8tes pour exploiter les technologies avanc\u00e9es de d\u00e9tection et de pr\u00e9vention des menaces. Gr\u00e2ce \u00e0 notre [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":14901,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-14948","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages\/14948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/comments?post=14948"}],"version-history":[{"count":9,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages\/14948\/revisions"}],"predecessor-version":[{"id":38995,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages\/14948\/revisions\/38995"}],"up":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages\/14901"}],"wp:attachment":[{"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/media?parent=14948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}