{"id":15654,"date":"2024-03-04T07:45:52","date_gmt":"2024-03-04T07:45:52","guid":{"rendered":"https:\/\/ramsdata.com.pl\/offre\/technologies\/nac-endpoint-security-nouvelle-generation\/"},"modified":"2025-06-23T17:29:17","modified_gmt":"2025-06-23T17:29:17","slug":"nac-endpoint-security-nouvelle-generation","status":"publish","type":"page","link":"https:\/\/ramsdata.com.pl\/fr\/offre\/technologies\/nac-endpoint-security-nouvelle-generation\/","title":{"rendered":"Nac Endpoint Security Nouvelle G\u00e9n\u00e9ration"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15654\" class=\"elementor elementor-15654 elementor-11357\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56ecedad e-flex e-con-boxed e-con e-parent\" data-id=\"56ecedad\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-de0e85e e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"de0e85e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1aaddd3e elementor-widget elementor-widget-heading\" data-id=\"1aaddd3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">NAC &amp; ENDPOINT SECURITY NEXT GENERATION\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2161080 e-flex e-con-boxed e-con e-parent\" data-id=\"2161080\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6f97420d e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"6f97420d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d857cb6 elementor-widget elementor-widget-text-editor\" data-id=\"5d857cb6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AddNet s\u00e9curise l&rsquo;acc\u00e8s au r\u00e9seau gr\u00e2ce \u00e0 la prise en charge int\u00e9gr\u00e9e de l&rsquo;authentification 802.1x et de l&rsquo;autorisation bas\u00e9e sur l&rsquo;adresse MAC. AddNet peut permettre la communication r\u00e9seau avec un appareil authentifi\u00e9 et assigner l&rsquo;appareil aux VLAN appropri\u00e9s en fonction des politiques mises en \u0153uvre sur la base de l&rsquo;adresse MAC. La fonctionnalit\u00e9 NAC de la solution de Novicom est ind\u00e9pendante du fournisseur et permet la mise en \u0153uvre d&rsquo;un acc\u00e8s s\u00e9curis\u00e9 au r\u00e9seau, quelle que soit l&rsquo;origine des commutateurs. Toutefois, pour tirer pleinement parti du syst\u00e8me AddNet NAC, il est n\u00e9cessaire que l&rsquo;infrastructure du r\u00e9seau prenne en charge la norme d&rsquo;authentification 802.1x \/ MAC. Cette exigence est actuellement satisfaite par la plupart des commutateurs des principaux fournisseurs.<\/p><p>L&rsquo;avantage d&rsquo;AddNet NAC est la simplicit\u00e9 de sa mise en \u0153uvre dans les r\u00e9seaux \u00e9tendus et distribu\u00e9s. Il est \u00e9galement possible de d\u00e9ployer le syst\u00e8me NAC sur des sites distants, ce qui permet de s\u00e9curiser l&rsquo;acc\u00e8s m\u00eame si le site central n&rsquo;est pas accessible. Pour ce faire, le serveur Radius a \u00e9t\u00e9 int\u00e9gr\u00e9 aux serveurs de travail AddNet distants.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f3fe8ec e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"4f3fe8ec\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-635f69f3 elementor-widget elementor-widget-image\" data-id=\"635f69f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"241\" height=\"200\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/02\/producenci_novicom.png.webp\" class=\"attachment-full size-full wp-image-12821\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d686db5 e-flex e-con-boxed e-con e-parent\" data-id=\"d686db5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-27c4aa47 e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"27c4aa47\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-520f7eed elementor-widget elementor-widget-heading\" data-id=\"520f7eed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Authentification 802.1x\/mac<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46cdd919 e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"46cdd919\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c4b5f0 e-con-full e-flex e-con e-child\" data-id=\"c4b5f0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-219c8eb elementor-widget elementor-widget-text-editor\" data-id=\"219c8eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pour la fonctionnalit\u00e9 NAC, AddNet utilise le protocole RADIUS standard, qui prend en charge l&rsquo;option d&rsquo;authentification 802.1x \/ MAC. La mise en \u0153uvre de la norme 802.1x selon la m\u00e9thode traditionnelle pose de nombreuses difficult\u00e9s suppl\u00e9mentaires li\u00e9es \u00e0 la pr\u00e9sence de demandeurs pour tous les appareils du r\u00e9seau et au maintien de certificats \u00e0 jour. Il existe \u00e9galement d&rsquo;autres risques, tels que la n\u00e9cessit\u00e9 de g\u00e9rer les exceptions &#8211; toutes les plateformes et tous les appareils ne disposent pas de supplicants. Souvent, pour cette raison, les ports r\u00e9seau de ces appareils sont plac\u00e9s en dehors du service 802.1x. La connexion \u00e9ventuelle d&rsquo;un autre appareil \u00e0 ce port expose \u00e0 un acc\u00e8s non autoris\u00e9 aux ressources du r\u00e9seau de l&rsquo;organisation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8526f18 e-con-full e-flex e-con e-child\" data-id=\"8526f18\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d455946 elementor-widget elementor-widget-text-editor\" data-id=\"d455946\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La plupart des utilisateurs d&rsquo;AddNet pr\u00e9f\u00e8rent pouvoir utiliser les m\u00e9canismes NAC sous la forme d&rsquo;une authentification de l&rsquo;adresse MAC avec une protection suppl\u00e9mentaire. Cela signifie que les appareils sont authentifi\u00e9s par leur adresse MAC. Une surveillance efficace est capable de suivre de nombreux param\u00e8tres en temps r\u00e9el et d&rsquo;avertir l&rsquo;administrateur d&rsquo;un appareil dont le MAC a \u00e9t\u00e9 modifi\u00e9. Cette approche est tr\u00e8s proche de la fonctionnalit\u00e9 compl\u00e8te de la norme 802.1x sans qu&rsquo;il soit n\u00e9cessaire de mettre en \u0153uvre l&rsquo;administration et la gestion des exceptions \u00e0 long terme.<\/p><p> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e9d46d e-con-full e-flex e-con e-child\" data-id=\"5e9d46d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7df510 elementor-widget elementor-widget-text-editor\" data-id=\"c7df510\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La mise en \u0153uvre de l&rsquo;authentification MAC d&rsquo;AddNet fait partie de la mise en \u0153uvre standard de DDI et il n&rsquo;y a pas d&rsquo;exigences suppl\u00e9mentaires en dehors de la configuration mat\u00e9rielle du r\u00e9seau. L&rsquo;ajout de quelques lignes suppl\u00e9mentaires dans la configuration de l&rsquo;\u00e9quipement r\u00e9seau permet d&rsquo;utiliser imm\u00e9diatement la fonctionnalit\u00e9 NAC. Du point de vue d&rsquo;AddNet, il suffit de d\u00e9finir les param\u00e8tres de communication pour les serveurs RADIUS.<\/p><p> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-231213b e-flex e-con-boxed e-con e-parent\" data-id=\"231213b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-904f8ef e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"904f8ef\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e6777d elementor-widget elementor-widget-heading\" data-id=\"5e6777d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">autorisation\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b45668f e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"b45668f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ef35e40 e-con-full e-flex e-con e-child\" data-id=\"ef35e40\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c60380 elementor-widget elementor-widget-text-editor\" data-id=\"5c60380\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Une autre caract\u00e9ristique importante d&rsquo;AddNet est la gestion des autorisations. Une fois l&rsquo;appareil authentifi\u00e9 &#8211; l&rsquo;acc\u00e8s de l&rsquo;appareil \u00e0 la communication r\u00e9seau est bas\u00e9 sur son identit\u00e9 &#8211; l&rsquo;\u00e9tape suivante est le processus d&rsquo;autorisation, qui d\u00e9termine le r\u00e9seau (VLAN) auquel l&rsquo;appareil doit \u00eatre assign\u00e9.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6027bba e-con-full e-flex e-con e-child\" data-id=\"6027bba\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-99d9a94 elementor-widget elementor-widget-text-editor\" data-id=\"99d9a94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le port de commutation concern\u00e9 est configur\u00e9 comme port d&rsquo;acc\u00e8s pour le VLAN correspondant. L&rsquo;appareil ne peut donc communiquer qu&rsquo;avec le VLAN qui lui a \u00e9t\u00e9 attribu\u00e9.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-87b9dcf e-con-full e-flex e-con e-child\" data-id=\"87b9dcf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-469aaeb elementor-widget elementor-widget-text-editor\" data-id=\"469aaeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L&rsquo;autorisation, comme l&rsquo;authentification 802.1 \/MAC, est contr\u00f4l\u00e9e par Radius, qui fait partie du serveur de travail AddNet. L&rsquo;avantage de ce mod\u00e8le est qu&rsquo;il n&rsquo;est pas n\u00e9cessaire de configurer un VLAN pour chaque commutateur. Les commutateurs sont contr\u00f4l\u00e9s dynamiquement par AddNet et l&rsquo;appareil est ajout\u00e9 \u00e0 un r\u00e9seau sp\u00e9cifique en fonction des besoins.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cf0ee57 e-con-full e-flex e-con e-child\" data-id=\"cf0ee57\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e88bb40 elementor-widget elementor-widget-text-editor\" data-id=\"e88bb40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>De cette mani\u00e8re, nous obtenons un \u00e9tat dans lequel le commutateur auquel un appareil est connect\u00e9 n&rsquo;a pas d&rsquo;importance, mais cet appareil obtiendra toujours son adresse IP et sera assign\u00e9 au VLAN appropri\u00e9.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d45be37 e-flex e-con-boxed e-con e-parent\" data-id=\"d45be37\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-98fdbf1 e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"98fdbf1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8991eb1 elementor-widget elementor-widget-image\" data-id=\"8991eb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"54\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/OPSWAT_Logo_CMYKwhite-300x54.png.webp\" class=\"attachment-large size-large wp-image-14046\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-971e888 e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"971e888\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-af4638e e-con-full e-flex e-con e-child\" data-id=\"af4638e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d582104 elementor-widget elementor-widget-heading\" data-id=\"d582104\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Contr\u00f4le d'acc\u00e8s au r\u00e9seau de nouvelle g\u00e9n\u00e9ration<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8646717 elementor-widget elementor-widget-text-editor\" data-id=\"8646717\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>MetaAccess emp\u00eache les appareils \u00e0 risque d&rsquo;acc\u00e9der aux r\u00e9seaux locaux et aux applications en nuage telles qu&rsquo;Office 365, Salesforce et Dropbox. Gr\u00e2ce \u00e0 une technologie de pr\u00e9vention des menaces avanc\u00e9e, MetaAccess effectue des tests de s\u00e9curit\u00e9 et de conformit\u00e9 approfondis sur les terminaux avant de leur permettre d&rsquo;acc\u00e9der aux donn\u00e9es de l&rsquo;entreprise, tout en proposant des contre-mesures en cas de probl\u00e8me.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a1b2a8 e-con-full e-flex e-con e-child\" data-id=\"6a1b2a8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4da2cb elementor-widget elementor-widget-heading\" data-id=\"e4da2cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Garantir la s\u00e9curit\u00e9 et la conformit\u00e9 des appareils<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-331951b elementor-widget elementor-widget-text-editor\" data-id=\"331951b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Avec la croissance et la popularit\u00e9 du (BYOD) et du (SDP), les donn\u00e9es de l&rsquo;entreprise sont de plus en plus accessibles par des appareils non g\u00e9r\u00e9s et potentiellement incompatibles ou risqu\u00e9s. Dans cette situation, MetaAccess permet aux organisations d&rsquo;appliquer des normes de s\u00e9curit\u00e9 internes et de r\u00e9pondre aux exigences de s\u00e9curit\u00e9 et de conformit\u00e9 sur tous les appareils acc\u00e9dant aux donn\u00e9es de l&rsquo;entreprise, que ces appareils appartiennent ou non \u00e0 l&rsquo;entreprise.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e8fe239 e-flex e-con-boxed e-con e-child\" data-id=\"e8fe239\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-861db08 elementor-widget elementor-widget-heading\" data-id=\"861db08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Garantir la s\u00e9curit\u00e9 et la conformit\u00e9 des appareils<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f5ba2a0 e-flex e-con-boxed e-con e-child\" data-id=\"f5ba2a0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-58868bf e-flex e-con-boxed e-con e-child\" data-id=\"58868bf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-86388a0 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"86388a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 56c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m0-48C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 168c-44.183 0-80 35.817-80 80s35.817 80 80 80 80-35.817 80-80-35.817-80-80-80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">D\u00e9tection des infections sur les appareils \u00e9quip\u00e9s de plusieurs moteurs antivirus utilisant la plateforme MetaDefender<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 56c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m0-48C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 168c-44.183 0-80 35.817-80 80s35.817 80 80 80 80-35.817 80-80-35.817-80-80-80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">V\u00e9rification compl\u00e8te de la conformit\u00e9 avec les politiques de s\u00e9curit\u00e9<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 56c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m0-48C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 168c-44.183 0-80 35.817-80 80s35.817 80 80 80 80-35.817 80-80-35.817-80-80-80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">D\u00e9tection et marquage de plus de 5 000 applications autoris\u00e9es par les fabricants<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-62f86c6 e-flex e-con-boxed e-con e-child\" data-id=\"62f86c6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-94036f1 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"94036f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 56c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m0-48C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 168c-44.183 0-80 35.817-80 80s35.817 80 80 80 80-35.817 80-80-35.817-80-80-80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Authentification de l'utilisateur et contr\u00f4le du verrouillage de l'\u00e9cran<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 56c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m0-48C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 168c-44.183 0-80 35.817-80 80s35.817 80 80 80 80-35.817 80-80-35.817-80-80-80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">V\u00e9rification compl\u00e8te de la conformit\u00e9 avec les politiques de s\u00e9curit\u00e9<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 56c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m0-48C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 168c-44.183 0-80 35.817-80 80s35.817 80 80 80 80-35.817 80-80-35.817-80-80-80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">D\u00e9tection des lacunes et des vuln\u00e9rabilit\u00e9s sur l'appareil<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>NAC &amp; ENDPOINT SECURITY NEXT GENERATION AddNet s\u00e9curise l&rsquo;acc\u00e8s au r\u00e9seau gr\u00e2ce \u00e0 la prise en charge int\u00e9gr\u00e9e de l&rsquo;authentification 802.1x et de l&rsquo;autorisation bas\u00e9e sur l&rsquo;adresse MAC. AddNet peut permettre la communication r\u00e9seau avec un appareil authentifi\u00e9 et assigner l&rsquo;appareil aux VLAN appropri\u00e9s en fonction des politiques mises en \u0153uvre sur la base de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":15644,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-15654","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages\/15654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/comments?post=15654"}],"version-history":[{"count":3,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages\/15654\/revisions"}],"predecessor-version":[{"id":39172,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages\/15654\/revisions\/39172"}],"up":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages\/15644"}],"wp:attachment":[{"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/media?parent=15654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}