{"id":2046,"date":"2022-01-07T15:01:29","date_gmt":"2022-01-07T14:01:29","guid":{"rendered":"https:\/\/www.solutions-exchange.fr\/?page_id=2046"},"modified":"2022-01-17T16:19:32","modified_gmt":"2022-01-17T15:19:32","slug":"manageengine-vmp","status":"publish","type":"page","link":"https:\/\/www.solutions-exchange.fr\/index.php\/manageengine-vmp\/","title":{"rendered":"ManageEngine VMP"},"content":{"rendered":"<p>[vc_row height_ratio=\u00a0\u00bb40&Prime; rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb1544&Prime;][vc_column]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text]<\/p>\n<h3 style=\"text-align: left;\"><span style=\"color: #ffffff;\">Vulnerability Manager Plus<\/span><\/h3>\n<h6><span style=\"color: #ffffff;\">Assurez un suivi int\u00e9gral de vos risques de s\u00e9curit\u00e9<\/span><\/h6>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;]<div class=\"eut-element eut-align-right\"><a href=\"https:\/\/www.solutions-exchange.fr\/index.php\/formulaire-demande-demonstration-vmp\/\" target=\"_blank\" class=\"eut-btn eut-btn-medium eut-round eut-bg-red eut-bg-hover-red\"><span>Demander une d\u00e9monstration<\/span><\/a><\/div>[\/vc_column][vc_column]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[vc_column_text]<\/p>\n<h5 style=\"text-align: center;\">Assurez un suivi int\u00e9gral de vos risques de s\u00e9curit\u00e9<\/h5>\n<p>[\/vc_column_text]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text]<strong>Vuln\u00e9rabilit\u00e9s<\/strong><br \/>\nVuln\u00e9rabilit\u00e9s des syst\u00e8mes d\u2019exploitation, tierces et zero-day.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text]<\/p>\n<p style=\"text-align: right;\"><strong>Configurations de s\u00e9curit\u00e9 incorrectes<\/strong><br \/>\nIdentifiants par d\u00e9faut, erreurs de configuration de pare-feu, utilisateurs et groupes inactifs, privil\u00e8ges \u00e9lev\u00e9s, partages ouverts.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column][mvc_advanced_button align=\u00a0\u00bbcenter\u00a0\u00bb btn_animation=\u00a0\u00bbbutton&#8211;antiman\u00a0\u00bb btn_text=\u00a0\u00bbD\u00e9tecter maintenant\u00a0\u00bb border_style=\u00a0\u00bbdotted\u00a0\u00bb border_width=\u00a0\u00bb1&Prime; google_fonts=\u00a0\u00bbfont_family:Abril%20Fatface%3Aregular|font_style:400%20regular%3A400%3Anormal\u00a0\u00bb btn_url=\u00a0\u00bburl:https%3A%2F%2Fwww.solutions-exchange.fr%2Findex.php%2Fformulaire-demande-demonstration-vmp%2F|target:_blank\u00a0\u00bb btn_bg=\u00a0\u00bb#0860a3&Prime; btn_clr=\u00a0\u00bb#ffffff\u00a0\u00bb btn_hvrclr=\u00a0\u00bb#ffffff\u00a0\u00bb btn_hvrbg=\u00a0\u00bb#ec7814&Prime;][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text]<strong>Configurations de serveur Web incorrectes<\/strong><br \/>\nErreurs de configuration DDoS, pages Web inutilis\u00e9es, erreurs de configuration d\u2019en-t\u00eates et d\u2019options HTTP, balayage d\u2019annuaire, expiration SSL\/TLS, script intersite[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text]<\/p>\n<p style=\"text-align: right;\"><strong>Logiciels \u00e0 risque \u00e9lev\u00e9<\/strong><br \/>\nLogiciels en fin de vie, de partage de poste de travail \u00e0 distance ou pair \u00e0 pair.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[\/vc_column][\/vc_row][vc_row rc_bg_type=\u00a0\u00bbcolor\u00a0\u00bb rc_bg_color=\u00a0\u00bb#0860a3&Prime;][vc_column]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[\/vc_column][vc_column][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><strong>Gestion des vuln\u00e9rabilit\u00e9s pour l\u2019entreprise<\/strong><\/span><br \/>\n<span style=\"color: #ffffff;\">Vulnerability Manager Plus est une solution de gestion int\u00e9gr\u00e9e des vuln\u00e9rabilit\u00e9s et des menaces d\u2019entreprise qui offre des fonctionnalit\u00e9s compl\u00e8tes d\u2019analyse des vuln\u00e9rabilit\u00e9s, d\u2019\u00e9valuation et de correction sur tous les terminaux de votre r\u00e9seau dans une console centrale.<\/span><\/p>\n<p>[\/vc_column_text]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><strong>Analyse<\/strong><\/span><\/p>\n<p>[\/vc_column_text]<div class=\"eut-element eut-single-icon eut-align-center eut-medium\" style=\"\">  <div class=\"eut-wrapper-icon eut-no-shape eut-text-grey\"><i class=\"fas fa-chart-pie eut-text-white\"><\/i><\/div><\/div>[vc_column_text]<span style=\"color: #ffffff;\">Analysez et d\u00e9couvrez les zones expos\u00e9es de tous vos terminaux locaux et distants ainsi que des p\u00e9riph\u00e9riques en itin\u00e9rance.<\/span>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><strong>\u00c9valuation<\/strong><\/span><\/p>\n<p>[\/vc_column_text]<div class=\"eut-element eut-single-icon eut-align-center eut-medium\" style=\"\">  <div class=\"eut-wrapper-icon eut-no-shape eut-text-grey\"><i class=\"fas fa-clipboard-check eut-text-white\"><\/i><\/div><\/div>[vc_column_text]<span style=\"color: #ffffff;\">Exploitez l\u2019analyse des attaques et priorisez les points les plus susceptibles de servir \u00e0 une attaque.<\/span>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><strong>Gestion<\/strong><\/span><\/p>\n<p>[\/vc_column_text]<div class=\"eut-element eut-single-icon eut-align-center eut-medium\" style=\"\">  <div class=\"eut-wrapper-icon eut-no-shape eut-text-grey\"><i class=\"fas fa-cog eut-text-white\"><\/i><\/div><\/div>[vc_column_text]<span style=\"color: #ffffff;\">Pr\u00e9venez l\u2019exploitation des failles de s\u00e9curit\u00e9 existantes de votre r\u00e9seau et l\u2019apparition de nouvelles.<\/span>[\/vc_column_text][\/vc_column][vc_column]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[\/vc_column][\/vc_row][vc_row rc_bg_type=\u00a0\u00bbcolor\u00a0\u00bb rc_font_color=\u00a0\u00bb#ffffff\u00a0\u00bb][vc_column]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[\/vc_column][vc_column][vc_column_text]<\/p>\n<h5 style=\"text-align: center;\">Fonctionnalit\u00e9s et avantages<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Toutes les fonctions essentielles pour g\u00e9rer les vuln\u00e9rabilit\u00e9s de votre r\u00e9seau sur une plateforme fiable.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;]<div class=\"eut-element eut-box-icon eut-medium eut-side-icon eut-align-left\" style=\"\"><div class=\"eut-wrapper-icon eut-no-shape eut-text-grey\"><i class=\"eut-text-primary-2 far fa-chart-bar\"><\/i><\/div><div class=\"eut-box-content\"><div class=\"eut-box-title-wrapper\"><h3 class=\"eut-box-title eut-h6\">\u00c9valuation des vuln\u00e9rabilit\u00e9s<\/h3><\/div><\/div><\/div>[vc_column_text]<strong><span style=\"color: #000000;\">Identifiez les risques r\u00e9els parmi une multitude de vuln\u00e9rabilit\u00e9s.<\/span><\/strong><br \/>\n<span style=\"color: #000000;\">\u00c9valuez et priorisez les vuln\u00e9rabilit\u00e9s selon l\u2019exploitabilit\u00e9, la gravit\u00e9, l\u2019\u00e2ge, le nombre de syst\u00e8mes affect\u00e9s et la disponibilit\u00e9 du correctif.<\/span>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;]<div class=\"eut-element eut-box-icon eut-medium eut-side-icon eut-align-left\" style=\"\"><div class=\"eut-wrapper-icon eut-no-shape eut-text-grey\"><i class=\"eut-text-primary-2 fas fa-shield-alt\"><\/i><\/div><div class=\"eut-box-content\"><div class=\"eut-box-title-wrapper\"><h3 class=\"eut-box-title eut-h6\">Gestion des correctifs<\/h3><\/div><\/div><\/div>[vc_column_text]<span style=\"color: #000000;\"><strong>Personnalisez, orchestrez et automatisez tout votre processus de mise \u00e0 jour corrective.<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">T\u00e9l\u00e9chargez, testez et d\u00e9ployez des correctifs automatiquement pour des applications Windows, Mac, Linux et tierces (plus de 250) avec un module de mise \u00e0 jour int\u00e9gral, sans co\u00fbt additionnel.<\/span>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;]<div class=\"eut-element eut-box-icon eut-medium eut-side-icon eut-align-left\" style=\"\"><div class=\"eut-wrapper-icon eut-no-shape eut-text-grey\"><i class=\"eut-text-primary-2 fas fa-tools\"><\/i><\/div><div class=\"eut-box-content\"><div class=\"eut-box-title-wrapper\"><h3 class=\"eut-box-title eut-h6\">Gestion des configurations de s\u00e9curit\u00e9<\/h3><\/div><\/div><\/div>[vc_column_text]<span style=\"color: #000000;\"><strong>Optimisez la s\u00e9curit\u00e9 de votre syst\u00e8me.<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Veillez \u00e0 ce que les syst\u00e8mes de votre r\u00e9seau appliquent des mots de passe complexes, des privil\u00e8ges minimaux et une protection m\u00e9moire, et assurez leur conformit\u00e9 aux r\u00e8gles s\u00e9curit\u00e9 CIS et STIG.<\/span>[\/vc_column_text][\/vc_column][vc_column]<div class=\"eut-empty-space eut-height-2x\" style=\"\"><\/div>[\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;]<div class=\"eut-element eut-box-icon eut-medium eut-side-icon eut-align-left\" style=\"\"><div class=\"eut-wrapper-icon eut-no-shape eut-text-grey\"><i class=\"eut-text-primary-2 fas fa-clipboard\"><\/i><\/div><div class=\"eut-box-content\"><div class=\"eut-box-title-wrapper\"><h3 class=\"eut-box-title eut-h6\">Pr\u00e9vention des vuln\u00e9rabilit\u00e9s zero-day<\/h3><\/div><\/div><\/div>[vc_column_text]<span style=\"color: #000000;\"><strong>N\u2019attendez plus des correctifs.<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Utilisez des scripts pr\u00e9-int\u00e9gr\u00e9s et test\u00e9s sans attendre qu\u2019un correctif ne prot\u00e8ge votre r\u00e9seau contre les vuln\u00e9rabilit\u00e9s zero-day.<\/span>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;]<div class=\"eut-element eut-box-icon eut-medium eut-side-icon eut-align-left\" style=\"\"><div class=\"eut-wrapper-icon eut-no-shape eut-text-grey\"><i class=\"eut-text-primary-2 fas fa-draw-polygon\"><\/i><\/div><div class=\"eut-box-content\"><div class=\"eut-box-title-wrapper\"><h3 class=\"eut-box-title eut-h6\">Renforcement des serveurs Web<\/h3><\/div><\/div><\/div>[vc_column_text]<span style=\"color: #000000;\"><strong>Ne n\u00e9gligez pas vos p\u00e9riph\u00e9riques reli\u00e9s \u00e0 Internet.<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Obtenez des d\u00e9tails sur la cause, l\u2019impact et la solution des failles de s\u00e9curit\u00e9 des serveurs Web. Ces informations permettent de prot\u00e9ger les serveurs contre de nombreuses variantes d\u2019attaque.<\/span>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;]<div class=\"eut-element eut-box-icon eut-medium eut-side-icon eut-align-left\" style=\"\"><div class=\"eut-wrapper-icon eut-no-shape eut-text-grey\"><i class=\"eut-text-primary-2 fas fa-chart-area\"><\/i><\/div><div class=\"eut-box-content\"><div class=\"eut-box-title-wrapper\"><h3 class=\"eut-box-title eut-h6\">Audit des logiciels \u00e0 risque \u00e9lev\u00e9<\/h3><\/div><\/div><\/div>[vc_column_text]<span style=\"color: #000000;\"><strong>\u00c9liminez les logiciels non autoris\u00e9s et non pris en charge.<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Identifiez les logiciels de partage de postes de travail \u00e0 distance, en fin de vie et pair \u00e0 pair qui sont jug\u00e9s dangereux et d\u00e9sinstallez-les rapidement des terminaux.<\/span>[\/vc_column_text][\/vc_column][vc_column]<div class=\"eut-empty-space eut-height-2x\" style=\"\"><\/div>[\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;]<div class=\"eut-element eut-box-icon eut-medium eut-side-icon eut-align-left\" style=\"\"><div class=\"eut-wrapper-icon eut-no-shape eut-text-grey\"><i class=\"eut-text-primary-2 fas fa-exclamation-circle\"><\/i><\/div><div class=\"eut-box-content\"><div class=\"eut-box-title-wrapper\"><h3 class=\"eut-box-title eut-h6\">Audit antivirus<\/h3><\/div><\/div><\/div>[vc_column_text]<span style=\"color: #000000;\"><strong>Obtenez des informations sur les syst\u00e8mes<\/strong><br \/>\n<span style=\"color: #000000;\">dont l\u2019antivirus est absent, inactif ou obsol\u00e8te.<\/span><\/span>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;]<div class=\"eut-element eut-box-icon eut-medium eut-side-icon eut-align-left\" style=\"\"><div class=\"eut-wrapper-icon eut-no-shape eut-text-grey\"><i class=\"eut-text-primary-2 fas fa-wifi\"><\/i><\/div><div class=\"eut-box-content\"><div class=\"eut-box-title-wrapper\"><h3 class=\"eut-box-title eut-h6\">Audit des ports<\/h3><\/div><\/div><\/div>[vc_column_text]<span style=\"color: #000000;\"><strong>Analysez les ports utilis\u00e9s et les processus concern\u00e9s<\/strong>,<\/span><br \/>\n<span style=\"color: #000000;\"> et identifiez les ports impr\u00e9vus qu\u2019un malware ou une application inconnue peut activer.<\/span>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;]<div class=\"eut-element eut-box-icon eut-medium eut-side-icon eut-align-left\" style=\"\"><div class=\"eut-wrapper-icon eut-no-shape eut-text-grey\"><i class=\"eut-text-primary-2 far fa-flag\"><\/i><\/div><div class=\"eut-box-content\"><div class=\"eut-box-title-wrapper\"><h3 class=\"eut-box-title eut-h6\">Rapports instructifs<\/h3><\/div><\/div><\/div>[vc_column_text]<span style=\"color: #000000;\"><strong>B\u00e9n\u00e9ficiez d\u2019un suivi global et d\u2019informations utiles<\/strong> <\/span><br \/>\n<span style=\"color: #000000;\">en termes de s\u00e9curit\u00e9 r\u00e9seau.<\/span>[\/vc_column_text][\/vc_column][vc_column]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[\/vc_column][\/vc_row][vc_row rc_bg_type=\u00a0\u00bbcolor\u00a0\u00bb rc_bg_color=\u00a0\u00bb#0860a3&Prime;][vc_column]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;]<div class=\"eut-element eut-single-icon eut-align-center eut-medium\" style=\"\">  <div class=\"eut-wrapper-icon eut-no-shape eut-text-grey\"><i class=\"fas fa-chart-line eut-text-primary-6\"><\/i><\/div><\/div>[vc_column_text]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><strong>Rapports analytiques<\/strong><\/span><br \/>\n<span style=\"color: #ffffff;\">Examinez votre situation de s\u00e9curit\u00e9 et prenez des d\u00e9cisions fond\u00e9es avec des rapports globaux.<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;]<div class=\"eut-element eut-single-icon eut-align-center eut-medium\" style=\"\">  <div class=\"eut-wrapper-icon eut-no-shape eut-text-grey\"><i class=\"fas fa-shield-alt eut-text-primary-6\"><\/i><\/div><\/div>[vc_column_text]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><strong>Audits antivirus<\/strong><\/span><br \/>\n<span style=\"color: #ffffff;\">Examinez la protection antivirus sur les syst\u00e8mes de votre r\u00e9seau.<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;]<div class=\"eut-element eut-single-icon eut-align-center eut-medium\" style=\"\">  <div class=\"eut-wrapper-icon eut-no-shape eut-text-grey\"><i class=\"fas fa-arrows-alt eut-text-primary-6\"><\/i><\/div><\/div>[vc_column_text]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><strong>Strat\u00e9gies de d\u00e9ploiement<\/strong><\/span><br \/>\n<span style=\"color: #ffffff;\">D\u00e9cidez des conditions de mise \u00e0 jour corrective (moment, objet et mode).<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;]<div class=\"eut-element eut-single-icon eut-align-center eut-medium\" style=\"\">  <div class=\"eut-wrapper-icon eut-no-shape eut-text-grey\"><i class=\"fas fa-user-shield eut-text-primary-6\"><\/i><\/div><\/div>[vc_column_text]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><strong>Administration bas\u00e9e sur le r\u00f4le<\/strong><\/span><br \/>\n<span style=\"color: #ffffff;\">D\u00e9finissez des r\u00f4les et d\u00e9l\u00e9guez des t\u00e2ches \u00e0 des techniciens selon les besoins de l\u2019entreprise.<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column]<div class=\"eut-empty-space\" style=\"height: 50px;\"><\/div>[\/vc_column][\/vc_row][vc_row rc_bg_type=\u00a0\u00bbcolor\u00a0\u00bb rc_font_color=\u00a0\u00bb#ffffff\u00a0\u00bb rc_bg_color=\u00a0\u00bb#ffffff\u00a0\u00bb][vc_column]<div class=\"eut-empty-space\" style=\"height: 50px;\"><\/div>[\/vc_column][vc_column][vc_column_text]<\/p>\n<h4 style=\"text-align: center;\">Se d\u00e9cline en trois \u00e9ditions<\/h4>\n<p>[\/vc_column_text]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; css=\u00a0\u00bb.vc_custom_1642000975003{margin-top: 2px !important;margin-right: 2px !important;margin-bottom: 2px !important;margin-left: 2px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 2px !important;padding-right: 2px !important;padding-bottom: 2px !important;padding-left: 2px !important;border-left-color: #ffffff !important;border-left-style: solid !important;border-right-color: #ffffff !important;border-right-style: solid !important;border-top-color: #ffffff !important;border-top-style: solid !important;border-bottom-color: #ffffff !important;border-bottom-style: solid !important;}\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1642001054604{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;}\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>\u00c9dition gratuite<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Jusqu\u2019\u00e0 25 ordinateurs<\/span><\/p>\n<p>[\/vc_column_text]<div class=\"eut-empty-space eut-height-1x\" style=\"\"><\/div>[vc_column_text css=\u00a0\u00bb.vc_custom_1642000987930{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;background-color: #ffffff !important;}\u00a0\u00bb]<\/p>\n<ul>\n<li style=\"text-align: center;\"><span style=\"color: #000000;\">Convient aux PME<\/span><\/li>\n<li style=\"text-align: center;\"><span style=\"color: #000000;\">Fonctionnalit\u00e9s compl\u00e8tes<\/span><\/li>\n<li style=\"text-align: center;\"><span style=\"color: #000000;\">Jusqu\u2019\u00e0 25 ordinateurs<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]<div class=\"eut-empty-space eut-height-4x\" style=\"\"><\/div><div class=\"eut-element eut-align-center\"><a href=\"https:\/\/www.solutions-exchange.fr\/index.php\/formulaire-demande-edition-gratuite-vmp\/\" target=\"_blank\" class=\"eut-btn eut-btn-medium eut-square eut-bg-red eut-bg-hover-red\"><span>Demander un acc\u00e8s<\/span><\/a><\/div>[\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Professionnel<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Convient aux ordinateurs sur des r\u00e9seaux locaux<\/span><\/p>\n<p>[\/vc_column_text]<div class=\"eut-empty-space eut-height-1x\" style=\"\"><\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"text-align: center;\"><span style=\"color: #000000;\">Analyse et \u00e9valuation des vuln\u00e9rabilit\u00e9s<\/span><\/li>\n<li style=\"text-align: center;\"><span style=\"color: #000000;\">D\u00e9tection des erreurs de configuration syst\u00e8me<\/span><\/li>\n<li style=\"text-align: center;\"><span style=\"color: #000000;\">D\u00e9tection des logiciels \u00e0 risque \u00e9lev\u00e9<\/span><\/li>\n<li style=\"text-align: center;\"><span style=\"color: #000000;\">D\u00e9tection et r\u00e9solution des erreurs de configuration serveur<\/span><\/li>\n<li style=\"text-align: center;\"><span style=\"color: #000000;\">Rapports sur les vuln\u00e9rabilit\u00e9s<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]<div class=\"eut-empty-space eut-height-1x\" style=\"\"><\/div><div class=\"eut-element eut-align-center\"><a href=\"https:\/\/www.solutions-exchange.fr\/index.php\/formulaire-demande-de-devis-vmp\/\" target=\"_blank\" class=\"eut-btn eut-btn-medium eut-square eut-bg-red eut-bg-hover-red\"><span>Demander un devis<\/span><\/a><\/div>[\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Entreprise<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Convient aux ordinateurs sur des r\u00e9seaux \u00e9tendus<\/span><\/p>\n<p>[\/vc_column_text]<div class=\"eut-empty-space eut-height-1x\" style=\"\"><\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Fonctionnalit\u00e9s de l\u2019\u00e9dition Professionnel +<\/strong><\/span><\/li>\n<li style=\"text-align: center;\"><span style=\"color: #000000;\">D\u00e9ploiement de configurations s\u00e9curis\u00e9es<\/span><\/li>\n<li style=\"text-align: center;\"><span style=\"color: #000000;\">D\u00e9ploiement de correctifs automatis\u00e9<\/span><\/li>\n<li style=\"text-align: center;\"><span style=\"color: #000000;\">Test et approbation des correctifs<\/span><\/li>\n<li style=\"text-align: center;\"><span style=\"color: #000000;\">D\u00e9sinstallation de logiciels \u00e0 risque \u00e9lev\u00e9<\/span><\/li>\n<li style=\"text-align: center;\"><span style=\"color: #000000;\">Pr\u00e9vention des vuln\u00e9rabilit\u00e9s zero-day<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]<div class=\"eut-empty-space eut-height-1x\" style=\"\"><\/div><div class=\"eut-element eut-align-center\"><a href=\"https:\/\/www.solutions-exchange.fr\/index.php\/formulaire-demande-de-devis-vmp\/\" target=\"_blank\" class=\"eut-btn eut-btn-medium eut-square eut-bg-red eut-bg-hover-red\"><span>Demander un devis<\/span><\/a><\/div>[\/vc_column][vc_column][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row height_ratio=\u00a0\u00bb40&Prime; rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb1544&Prime;][vc_column][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text] Vulnerability Manager Plus Assurez un suivi int\u00e9gral de vos risques de s\u00e9curit\u00e9 [\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][\/vc_column][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] Assurez un suivi int\u00e9gral de vos risques de s\u00e9curit\u00e9 [\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text]Vuln\u00e9rabilit\u00e9s Vuln\u00e9rabilit\u00e9s des syst\u00e8mes d\u2019exploitation, tierces et zero-day.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text] Configurations de s\u00e9curit\u00e9 incorrectes Identifiants par d\u00e9faut, erreurs de configuration de pare-feu, utilisateurs et groupes inactifs, privil\u00e8ges [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-2046","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ManageEngine VMP - Solutions Exchange<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.solutions-exchange.fr\/index.php\/manageengine-vmp\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ManageEngine VMP - Solutions Exchange\" \/>\n<meta property=\"og:description\" content=\"[vc_row height_ratio=\u00a0\u00bb40&Prime; rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb1544&Prime;][vc_column][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text] Vulnerability Manager Plus Assurez un suivi int\u00e9gral de vos risques de s\u00e9curit\u00e9 [\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][\/vc_column][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] Assurez un suivi int\u00e9gral de vos risques de s\u00e9curit\u00e9 [\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text]Vuln\u00e9rabilit\u00e9s Vuln\u00e9rabilit\u00e9s des syst\u00e8mes d\u2019exploitation, tierces et zero-day.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text] Configurations de s\u00e9curit\u00e9 incorrectes Identifiants par d\u00e9faut, erreurs de configuration de pare-feu, utilisateurs et groupes inactifs, privil\u00e8ges [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.solutions-exchange.fr\/index.php\/manageengine-vmp\/\" \/>\n<meta property=\"og:site_name\" content=\"Solutions Exchange\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-17T15:19:32+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/manageengine-vmp\\\/\",\"url\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/manageengine-vmp\\\/\",\"name\":\"ManageEngine VMP - Solutions Exchange\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/#website\"},\"datePublished\":\"2022-01-07T14:01:29+00:00\",\"dateModified\":\"2022-01-17T15:19:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/manageengine-vmp\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/manageengine-vmp\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/manageengine-vmp\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ManageEngine VMP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/#website\",\"url\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/\",\"name\":\"Solutions Exchange\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ManageEngine VMP - Solutions Exchange","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.solutions-exchange.fr\/index.php\/manageengine-vmp\/","og_locale":"fr_FR","og_type":"article","og_title":"ManageEngine VMP - Solutions Exchange","og_description":"[vc_row height_ratio=\u00a0\u00bb40&Prime; rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb1544&Prime;][vc_column][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text] Vulnerability Manager Plus Assurez un suivi int\u00e9gral de vos risques de s\u00e9curit\u00e9 [\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][\/vc_column][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] Assurez un suivi int\u00e9gral de vos risques de s\u00e9curit\u00e9 [\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text]Vuln\u00e9rabilit\u00e9s Vuln\u00e9rabilit\u00e9s des syst\u00e8mes d\u2019exploitation, tierces et zero-day.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text] Configurations de s\u00e9curit\u00e9 incorrectes Identifiants par d\u00e9faut, erreurs de configuration de pare-feu, utilisateurs et groupes inactifs, privil\u00e8ges [&hellip;]","og_url":"https:\/\/www.solutions-exchange.fr\/index.php\/manageengine-vmp\/","og_site_name":"Solutions Exchange","article_modified_time":"2022-01-17T15:19:32+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.solutions-exchange.fr\/index.php\/manageengine-vmp\/","url":"https:\/\/www.solutions-exchange.fr\/index.php\/manageengine-vmp\/","name":"ManageEngine VMP - Solutions Exchange","isPartOf":{"@id":"https:\/\/www.solutions-exchange.fr\/#website"},"datePublished":"2022-01-07T14:01:29+00:00","dateModified":"2022-01-17T15:19:32+00:00","breadcrumb":{"@id":"https:\/\/www.solutions-exchange.fr\/index.php\/manageengine-vmp\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.solutions-exchange.fr\/index.php\/manageengine-vmp\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.solutions-exchange.fr\/index.php\/manageengine-vmp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.solutions-exchange.fr\/"},{"@type":"ListItem","position":2,"name":"ManageEngine VMP"}]},{"@type":"WebSite","@id":"https:\/\/www.solutions-exchange.fr\/#website","url":"https:\/\/www.solutions-exchange.fr\/","name":"Solutions Exchange","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.solutions-exchange.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"zuperla-eutf-large-rect-horizontal":false,"zuperla-eutf-small-square":false,"zuperla-eutf-small-rect-horizontal":false,"zuperla-eutf-small-rect-vertical":false,"zuperla-eutf-medium-square":false,"zuperla-eutf-medium-rect-horizontal":false,"zuperla-eutf-medium-rect-vertical":false,"zuperla-eutf-fullscreen":false},"uagb_author_info":{"display_name":"admin6583","author_link":"https:\/\/www.solutions-exchange.fr\/index.php\/author\/admin6583\/"},"uagb_comment_info":0,"uagb_excerpt":"[vc_row height_ratio=\u00a0\u00bb40&Prime; rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb1544&Prime;][vc_column][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text] Vulnerability Manager Plus Assurez un suivi int\u00e9gral de vos risques de s\u00e9curit\u00e9 [\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][\/vc_column][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] Assurez un suivi int\u00e9gral de vos risques de s\u00e9curit\u00e9 [\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text]Vuln\u00e9rabilit\u00e9s Vuln\u00e9rabilit\u00e9s des syst\u00e8mes d\u2019exploitation, tierces et zero-day.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text] Configurations de s\u00e9curit\u00e9 incorrectes Identifiants par d\u00e9faut, erreurs de configuration de pare-feu, utilisateurs et groupes inactifs, privil\u00e8ges\u2026","_links":{"self":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/pages\/2046","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/comments?post=2046"}],"version-history":[{"count":84,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/pages\/2046\/revisions"}],"predecessor-version":[{"id":2167,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/pages\/2046\/revisions\/2167"}],"wp:attachment":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/media?parent=2046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}