{"id":15771,"date":"2024-03-04T10:26:42","date_gmt":"2024-03-04T10:26:42","guid":{"rendered":"https:\/\/ramsdata.com.pl\/offre\/technologies-2\/"},"modified":"2024-03-16T11:58:37","modified_gmt":"2024-03-16T11:58:37","slug":"technologies-2","status":"publish","type":"page","link":"https:\/\/ramsdata.com.pl\/fr\/offre\/technologies-2\/","title":{"rendered":"Technologies"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15771\" class=\"elementor elementor-15771 elementor-11511\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7cd6148 e-flex e-con-boxed e-con e-parent\" data-id=\"7cd6148\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-552dd849 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"552dd849\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2841dde7 elementor-widget elementor-widget-heading\" data-id=\"2841dde7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">TECHNOLOGIES<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1926e23b e-flex e-con-boxed e-con e-parent\" data-id=\"1926e23b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6bc3b44b e-flex e-con-boxed e-con e-child\" data-id=\"6bc3b44b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-56230c2d e-flex e-con-boxed e-con e-child\" data-id=\"56230c2d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eaa90a1 elementor-widget elementor-widget-image\" data-id=\"eaa90a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"374\" height=\"200\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/producenci_paloalto.png-1.webp\" class=\"attachment-full size-full wp-image-14391\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/producenci_paloalto.png-1.webp 374w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/producenci_paloalto.png-1-300x160.webp 300w\" sizes=\"(max-width: 374px) 100vw, 374px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-25528a4e e-flex e-con-boxed e-con e-child\" data-id=\"25528a4e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-236f3487 elementor-widget elementor-widget-text-editor\" data-id=\"236f3487\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Emp\u00eacher la transmission de fichiers malveillants pour les applications web qui contournent les bacs \u00e0 sable et les solutions uniques de d\u00e9tection des logiciels malveillants.<\/p>\n<p>D\u00e9sarmement et reconstruction du contenu en profondeur (Deep CDR) : D\u00e9sarmement de plus de 90 types de fichiers courants et reconstruction de chaque fichier, pour une utilisation totale avec un contenu s\u00e9curis\u00e9.<\/p>\n<p>Analyse avec plus de 20 moteurs de protection contre les logiciels malveillants utilisant des signatures, des heuristiques et des technologies d&rsquo;apprentissage automatique pour d\u00e9tecter les menaces connues et inconnues le plus t\u00f4t et le plus efficacement possible.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35aab39 elementor-widget elementor-widget-button\" data-id=\"35aab39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">En savoir plus<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26d29962 e-flex e-con-boxed e-con e-child\" data-id=\"26d29962\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-72b75533 e-flex e-con-boxed e-con e-child\" data-id=\"72b75533\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55e2f91e elementor-widget elementor-widget-text-editor\" data-id=\"55e2f91e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AddNet s\u00e9curise l&rsquo;acc\u00e8s au r\u00e9seau gr\u00e2ce \u00e0 la prise en charge int\u00e9gr\u00e9e de l&rsquo;authentification 802.1x et de l&rsquo;autorisation bas\u00e9e sur l&rsquo;adresse MAC. AddNet peut permettre la communication r\u00e9seau avec un appareil authentifi\u00e9 et assigner l&rsquo;appareil aux VLAN appropri\u00e9s en fonction des politiques mises en \u0153uvre sur la base de l&rsquo;adresse MAC. La fonctionnalit\u00e9 NAC de la solution de Novicom est ind\u00e9pendante du fournisseur et permet la mise en \u0153uvre d&rsquo;un acc\u00e8s s\u00e9curis\u00e9 au r\u00e9seau, quelle que soit l&rsquo;origine des commutateurs. Toutefois, pour tirer pleinement parti du syst\u00e8me AddNet NAC, il est n\u00e9cessaire que l&rsquo;infrastructure du r\u00e9seau prenne en charge la norme d&rsquo;authentification 802.1x \/ MAC. Cette exigence est actuellement satisfaite par la plupart des commutateurs des principaux fournisseurs.<\/p>\n<p>L&rsquo;avantage d&rsquo;AddNet NAC est la simplicit\u00e9 de sa mise en \u0153uvre dans les r\u00e9seaux \u00e9tendus et distribu\u00e9s. Il est \u00e9galement possible de d\u00e9ployer le syst\u00e8me NAC sur des sites distants, ce qui permet de s\u00e9curiser l&rsquo;acc\u00e8s m\u00eame si le site central n&rsquo;est pas accessible. Pour ce faire, le serveur Radius a \u00e9t\u00e9 int\u00e9gr\u00e9 aux serveurs de travail AddNet distants.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acf622f elementor-widget elementor-widget-button\" data-id=\"acf622f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">En savoir plus<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-585382fb e-flex e-con-boxed e-con e-child\" data-id=\"585382fb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40f025ea elementor-widget elementor-widget-image\" data-id=\"40f025ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"241\" height=\"200\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/producenci_novicom.png-1.webp\" class=\"attachment-full size-full wp-image-14396\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6c7fb5b e-flex e-con-boxed e-con e-child\" data-id=\"6c7fb5b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-25a39df e-flex e-con-boxed e-con e-child\" data-id=\"25a39df\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f2796a elementor-widget elementor-widget-image\" data-id=\"1f2796a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"139\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/OPSWAT_Logo_CMYKwhite-768x139.png.webp\" class=\"attachment-full size-full wp-image-13021\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/OPSWAT_Logo_CMYKwhite-768x139.png.webp 768w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/OPSWAT_Logo_CMYKwhite-768x139.png-300x54.webp 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7772029 e-flex e-con-boxed e-con e-child\" data-id=\"7772029\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2297ee9 elementor-widget elementor-widget-text-editor\" data-id=\"2297ee9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les r\u00e9seaux critiques posent un d\u00e9fi particulier aux praticiens de la s\u00e9curit\u00e9 parce qu&rsquo;ils sont isol\u00e9s et n&rsquo;ont pas acc\u00e8s \u00e0 l&rsquo;internet, ce qui les rend vuln\u00e9rables aux attaques des m\u00e9dias mobiles et des technologies de transfert de fichiers similaires. OPSWAT offre un processus s\u00e9curis\u00e9 de bout en bout pour le transfert de fichiers vers et depuis des r\u00e9seaux isol\u00e9s. Cette solution est largement utilis\u00e9e dans les secteurs de la fabrication, de l&rsquo;\u00e9nergie, de l&rsquo;administration, de la banque, de l&rsquo;industrie pharmaceutique et du divertissement.<\/p><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c461c3 elementor-widget elementor-widget-button\" data-id=\"4c461c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">En savoir plus<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9fc4554 e-flex e-con-boxed e-con e-child\" data-id=\"9fc4554\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a413c83 e-flex e-con-boxed e-con e-child\" data-id=\"a413c83\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-95bf0b5 elementor-widget elementor-widget-text-editor\" data-id=\"95bf0b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les solutions CryptoFlow de Certes sont les premiers produits de l&rsquo;industrie \u00e0 combiner la flexibilit\u00e9 et la puissance des r\u00e9seaux virtualis\u00e9s avec la technologie cryptographique la plus s\u00fbre. Avec les solutions CryptoFlow de Certes, les entreprises et les fournisseurs de services peuvent cr\u00e9er des VPN de nouvelle g\u00e9n\u00e9ration sans tunnel, multipoints et multicouches qui prot\u00e8gent le trafic de n&rsquo;importe quelle application sur n&rsquo;importe quel r\u00e9seau (VPN de nouvelle g\u00e9n\u00e9ration). Les CryptoFlow-VPN prot\u00e8gent le trafic de donn\u00e9es dans les environnements LAN, WAN, Internet, virtuels et en nuage. Certes CryptoFlow-VPN peut \u00eatre configur\u00e9 en quelques secondes, gr\u00e2ce \u00e0 une interface point-and-click extr\u00eamement simple pour cr\u00e9er des politiques de s\u00e9curit\u00e9.<\/p><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9366874 elementor-widget elementor-widget-button\" data-id=\"9366874\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">En savoir plus<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6c6b9cd e-flex e-con-boxed e-con e-child\" data-id=\"6c6b9cd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-36119b9 elementor-widget elementor-widget-image\" data-id=\"36119b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"247\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/certes-networks-logo-768x247.png-1.webp\" class=\"attachment-full size-full wp-image-14441\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/certes-networks-logo-768x247.png-1.webp 768w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/certes-networks-logo-768x247.png-1-300x96.webp 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1e7b8b e-flex e-con-boxed e-con e-child\" data-id=\"f1e7b8b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-17c555f e-flex e-con-boxed e-con e-child\" data-id=\"17c555f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d25ac86 elementor-widget elementor-widget-image\" data-id=\"d25ac86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"213\" height=\"200\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/producenci_f5.png.webp\" class=\"attachment-full size-full wp-image-14446\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cf1ca81 e-flex e-con-boxed e-con e-child\" data-id=\"cf1ca81\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8c2c1e elementor-widget elementor-widget-text-editor\" data-id=\"e8c2c1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les menaces les plus dangereuses pour l&rsquo;infrastructure informatique sont li\u00e9es \u00e0 des attaques ciblant les vuln\u00e9rabilit\u00e9s des applications. Les mesures de s\u00e9curit\u00e9 conventionnelles telles que les pare-feu et les syst\u00e8mes de d\u00e9tection d&rsquo;intrusion ont beaucoup de mal \u00e0 d\u00e9tecter ce type d&rsquo;intrusion.<br \/>Application Security Manager (ASM) fournit une protection compl\u00e8te pour les applications Web et les services bas\u00e9s sur XML. L&rsquo;utilisation d&rsquo;un pare-feu applicatif offre aux clients des avantages majeurs, notamment : la protection contre les attaques d&rsquo;applications, la conformit\u00e9 aux r\u00e9glementations (par exemple PCI DSS) et la r\u00e9ussite des audits de s\u00e9curit\u00e9 sans interf\u00e9rer avec le code de l&rsquo;application.<\/p><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77efd0a elementor-widget elementor-widget-button\" data-id=\"77efd0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">En savoir plus<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>TECHNOLOGIES Emp\u00eacher la transmission de fichiers malveillants pour les applications web qui contournent les bacs \u00e0 sable et les solutions uniques de d\u00e9tection des logiciels malveillants. D\u00e9sarmement et reconstruction du contenu en profondeur (Deep CDR) : D\u00e9sarmement de plus de 90 types de fichiers courants et reconstruction de chaque fichier, pour une utilisation totale avec [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":15124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-15771","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages\/15771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/comments?post=15771"}],"version-history":[{"count":1,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages\/15771\/revisions"}],"predecessor-version":[{"id":15785,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages\/15771\/revisions\/15785"}],"up":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages\/15124"}],"wp:attachment":[{"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/media?parent=15771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}