{"id":1410,"date":"2021-11-05T09:47:10","date_gmt":"2021-11-05T08:47:10","guid":{"rendered":"https:\/\/contact.solutions-exchange.fr\/?page_id=1410"},"modified":"2022-01-13T09:32:04","modified_gmt":"2022-01-13T08:32:04","slug":"securite-de-l-infrastructure","status":"publish","type":"page","link":"https:\/\/www.solutions-exchange.fr\/index.php\/nos-solutions\/securite-de-l-infrastructure\/","title":{"rendered":"S\u00e9curit\u00e9 de l\u2019infrastructure"},"content":{"rendered":"<p>[vc_row height_ratio=\u00a0\u00bb40&Prime; rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb1545&Prime;][vc_column]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[vc_column_text]<\/p>\n<h3 style=\"text-align: left;\"><span style=\"color: #ffffff;\"><br \/>\nS\u00e9curit\u00e9 de l\u2019infrastructure<br \/>\n<\/span><\/h3>\n<p><span style=\"color: #ffffff;\">Prot\u00e9ger son infrastructure et les donn\u00e9es qui y sont pr\u00e9sentes<\/span>[\/vc_column_text]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1636102008798{padding: 2px !important;border: 2px solid #0860a3 !important;border-radius: 2px !important;}\u00a0\u00bb][vc_column_text]<\/p>\n<h5 style=\"text-align: center;\">Analyser le comportement des utilisateurs<\/h5>\n<h6 style=\"text-align: center;\">Netwrix Auditor<\/h6>\n<p style=\"text-align: center;\">Analyse des comportements inhabituels.<\/p>\n<p>[\/vc_column_text]<div class=\"eut-element eut-align-center\"><a href=\"https:\/\/contact.solutions-exchange.fr\/index.php\/netwrix-auditor\/\" title=\"Netwrix Auditor\" target=\"_blank\" class=\"eut-btn eut-btn-small eut-square eut-bg-primary-2 eut-bg-hover-primary-6\"><span>Plus d'informations<\/span><\/a><\/div>[\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1636100795767{padding: 2px !important;border: 2px solid #0860a3 !important;border-radius: 2px !important;}\u00a0\u00bb][vc_column_text]<\/p>\n<h5 style=\"text-align: center;\">Supervision et Reporting des produits Microsoft<\/h5>\n<h6 style=\"text-align: center;\">ENow Management System<\/h6>\n<p style=\"text-align: center;\">Visualiser et \u00eatre alerter sur les d\u00e9gradations syst\u00e8me<\/p>\n<p>[\/vc_column_text]<div class=\"eut-element eut-align-center\"><a href=\"https:\/\/contact.solutions-exchange.fr\/index.php\/enow-system-management\/\" title=\"ENow System\" target=\"_blank\" class=\"eut-btn eut-btn-small eut-square eut-bg-primary-2 eut-bg-hover-primary-6\"><span>Plus d'informations<\/span><\/a><\/div>[\/vc_column][vc_column css=\u00a0\u00bb.vc_custom_1636102118184{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 2px !important;padding-right: 2px !important;padding-bottom: 2px !important;padding-left: 2px !important;}\u00a0\u00bb]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1636102045399{padding: 2px !important;border: 2px solid #0860a3 !important;border-radius: 2px !important;}\u00a0\u00bb][vc_column_text]<\/p>\n<h5 style=\"text-align: center;\">S\u00e9curiser votre syst\u00e8me de messagerie<\/h5>\n<h6 style=\"text-align: center;\">Barracuda Message Archiver<\/h6>\n<p style=\"text-align: center;\">Archivage des emails<\/p>\n<p>[\/vc_column_text]<div class=\"eut-element eut-align-center\"><a href=\"https:\/\/contact.solutions-exchange.fr\/index.php\/barracuda\/barracuda-message-archiver\/\" title=\"BMA\" target=\"_blank\" class=\"eut-btn eut-btn-small eut-square eut-bg-primary-2 eut-bg-hover-primary-6\"><span>Plus d'informations<\/span><\/a><\/div>[\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1636102140031{padding: 2px !important;border: 2px solid #0860a3 !important;border-radius: 2px !important;}\u00a0\u00bb][vc_column_text]<\/p>\n<h5 style=\"text-align: center;\">Protection performante de vos sites distants multiples<\/h5>\n<h6 style=\"text-align: center;\">Barracuda CloudGen Firewall<\/h6>\n<p style=\"text-align: center;\">Protection et QOS des sites distants<\/p>\n<p>[\/vc_column_text]<div class=\"eut-element eut-align-center\"><a href=\"https:\/\/contact.solutions-exchange.fr\/index.php\/barracuda\/barracuda-cloudgen-firewall\/\" title=\"Barracuda CloudGen Firewall\" target=\"_blank\" class=\"eut-btn eut-btn-small eut-square eut-bg-primary-2 eut-bg-hover-primary-6\"><span>Plus d'informations<\/span><\/a><\/div>[\/vc_column][vc_column]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1642062823312{border: 2px solid #0860a3 !important;border-radius: 2px !important;}\u00a0\u00bb][vc_column_text]<\/p>\n<h5 style=\"text-align: center;\">D\u00e9tecter vos vuln\u00e9rabilit\u00e9s<\/h5>\n<h6 style=\"text-align: center;\">Vulnerability Manager Plus<\/h6>\n<p style=\"text-align: center;\">Assurez un suivi int\u00e9gral de vos risques de s\u00e9curit\u00e9<\/p>\n<p>[\/vc_column_text]<div class=\"eut-element eut-align-center\"><a href=\"https:\/\/www.solutions-exchange.fr\/index.php\/manageengine-vmp\/\" title=\"VMP\" target=\"_blank\" class=\"eut-btn eut-btn-small eut-square eut-bg-primary-2 eut-bg-hover-primary-6\"><span>Plus d'informations<\/span><\/a><\/div>[\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][\/vc_column][vc_column]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row height_ratio=\u00a0\u00bb40&Prime; rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb1545&Prime;][vc_column][vc_column_text] S\u00e9curit\u00e9 de l\u2019infrastructure Prot\u00e9ger son infrastructure et les donn\u00e9es qui y sont pr\u00e9sentes[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1636102008798{padding: 2px !important;border: 2px solid #0860a3 !important;border-radius: 2px !important;}\u00a0\u00bb][vc_column_text] Analyser le comportement des utilisateurs Netwrix Auditor Analyse des comportements inhabituels. [\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1636100795767{padding: 2px !important;border: 2px solid #0860a3 !important;border-radius: 2px !important;}\u00a0\u00bb][vc_column_text] Supervision et Reporting des produits Microsoft [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1383,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-1410","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curit\u00e9 de l\u2019infrastructure - Solutions Exchange<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.solutions-exchange.fr\/index.php\/nos-solutions\/securite-de-l-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 de l\u2019infrastructure - Solutions Exchange\" \/>\n<meta property=\"og:description\" content=\"[vc_row height_ratio=\u00a0\u00bb40&Prime; rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb1545&Prime;][vc_column][vc_column_text] S\u00e9curit\u00e9 de l\u2019infrastructure Prot\u00e9ger son infrastructure et les donn\u00e9es qui y sont pr\u00e9sentes[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1636102008798{padding: 2px !important;border: 2px solid #0860a3 !important;border-radius: 2px !important;}\u00a0\u00bb][vc_column_text] Analyser le comportement des utilisateurs Netwrix Auditor Analyse des comportements inhabituels. [\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1636100795767{padding: 2px !important;border: 2px solid #0860a3 !important;border-radius: 2px !important;}\u00a0\u00bb][vc_column_text] Supervision et Reporting des produits Microsoft [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.solutions-exchange.fr\/index.php\/nos-solutions\/securite-de-l-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"Solutions Exchange\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-13T08:32:04+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/nos-solutions\\\/securite-de-l-infrastructure\\\/\",\"url\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/nos-solutions\\\/securite-de-l-infrastructure\\\/\",\"name\":\"S\u00e9curit\u00e9 de l\u2019infrastructure - Solutions Exchange\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/#website\"},\"datePublished\":\"2021-11-05T08:47:10+00:00\",\"dateModified\":\"2022-01-13T08:32:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/nos-solutions\\\/securite-de-l-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/nos-solutions\\\/securite-de-l-infrastructure\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/nos-solutions\\\/securite-de-l-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nos Solutions\",\"item\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/nos-solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"S\u00e9curit\u00e9 de l\u2019infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/#website\",\"url\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/\",\"name\":\"Solutions Exchange\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 de l\u2019infrastructure - Solutions Exchange","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.solutions-exchange.fr\/index.php\/nos-solutions\/securite-de-l-infrastructure\/","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 de l\u2019infrastructure - Solutions Exchange","og_description":"[vc_row height_ratio=\u00a0\u00bb40&Prime; rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb1545&Prime;][vc_column][vc_column_text] S\u00e9curit\u00e9 de l\u2019infrastructure Prot\u00e9ger son infrastructure et les donn\u00e9es qui y sont pr\u00e9sentes[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1636102008798{padding: 2px !important;border: 2px solid #0860a3 !important;border-radius: 2px !important;}\u00a0\u00bb][vc_column_text] Analyser le comportement des utilisateurs Netwrix Auditor Analyse des comportements inhabituels. [\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1636100795767{padding: 2px !important;border: 2px solid #0860a3 !important;border-radius: 2px !important;}\u00a0\u00bb][vc_column_text] Supervision et Reporting des produits Microsoft [&hellip;]","og_url":"https:\/\/www.solutions-exchange.fr\/index.php\/nos-solutions\/securite-de-l-infrastructure\/","og_site_name":"Solutions Exchange","article_modified_time":"2022-01-13T08:32:04+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.solutions-exchange.fr\/index.php\/nos-solutions\/securite-de-l-infrastructure\/","url":"https:\/\/www.solutions-exchange.fr\/index.php\/nos-solutions\/securite-de-l-infrastructure\/","name":"S\u00e9curit\u00e9 de l\u2019infrastructure - Solutions Exchange","isPartOf":{"@id":"https:\/\/www.solutions-exchange.fr\/#website"},"datePublished":"2021-11-05T08:47:10+00:00","dateModified":"2022-01-13T08:32:04+00:00","breadcrumb":{"@id":"https:\/\/www.solutions-exchange.fr\/index.php\/nos-solutions\/securite-de-l-infrastructure\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.solutions-exchange.fr\/index.php\/nos-solutions\/securite-de-l-infrastructure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.solutions-exchange.fr\/index.php\/nos-solutions\/securite-de-l-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.solutions-exchange.fr\/"},{"@type":"ListItem","position":2,"name":"Nos Solutions","item":"https:\/\/www.solutions-exchange.fr\/index.php\/nos-solutions\/"},{"@type":"ListItem","position":3,"name":"S\u00e9curit\u00e9 de l\u2019infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/www.solutions-exchange.fr\/#website","url":"https:\/\/www.solutions-exchange.fr\/","name":"Solutions Exchange","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.solutions-exchange.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"zuperla-eutf-large-rect-horizontal":false,"zuperla-eutf-small-square":false,"zuperla-eutf-small-rect-horizontal":false,"zuperla-eutf-small-rect-vertical":false,"zuperla-eutf-medium-square":false,"zuperla-eutf-medium-rect-horizontal":false,"zuperla-eutf-medium-rect-vertical":false,"zuperla-eutf-fullscreen":false},"uagb_author_info":{"display_name":"admin6583","author_link":"https:\/\/www.solutions-exchange.fr\/index.php\/author\/admin6583\/"},"uagb_comment_info":0,"uagb_excerpt":"[vc_row height_ratio=\u00a0\u00bb40&Prime; rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb1545&Prime;][vc_column][vc_column_text] S\u00e9curit\u00e9 de l\u2019infrastructure Prot\u00e9ger son infrastructure et les donn\u00e9es qui y sont pr\u00e9sentes[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1636102008798{padding: 2px !important;border: 2px solid #0860a3 !important;border-radius: 2px !important;}\u00a0\u00bb][vc_column_text] Analyser le comportement des utilisateurs Netwrix Auditor Analyse des comportements inhabituels. [\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; css=\u00a0\u00bb.vc_custom_1636100795767{padding: 2px !important;border: 2px solid #0860a3 !important;border-radius: 2px !important;}\u00a0\u00bb][vc_column_text] Supervision et Reporting des produits Microsoft\u2026","_links":{"self":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/pages\/1410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/comments?post=1410"}],"version-history":[{"count":8,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/pages\/1410\/revisions"}],"predecessor-version":[{"id":2134,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/pages\/1410\/revisions\/2134"}],"up":[{"embeddable":true,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/pages\/1383"}],"wp:attachment":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/media?parent=1410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}