{"id":22554,"date":"2021-05-26T15:00:12","date_gmt":"2021-05-26T19:00:12","guid":{"rendered":"https:\/\/www.present.ca\/?page_id=22554"},"modified":"2024-05-29T10:06:26","modified_gmt":"2024-05-29T14:06:26","slug":"protection-des-points-terminaux","status":"publish","type":"page","link":"https:\/\/www.present.ca\/fr\/solutions\/securite-geree-ti\/protection-des-points-terminaux\/","title":{"rendered":"Protection des points terminaux"},"content":{"rendered":"<p>[vc_row][vc_column]<div id=\"ultimate-heading-474969f44c583a1f3\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-474969f44c583a1f3 uvc-646 \" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-474969f44c583a1f3 h2'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h2 style=\"font-weight:normal;\">D\u00e9tection et r\u00e9ponse g\u00e9r\u00e9es<\/h2><\/div><\/div>[vc_empty_space][vc_column_text]Chaque jour, des milliers de points terminaux sont compromis par les cybercriminels, car ils restent la porte d&rsquo;entr\u00e9e la plus simple pour les pirates informatiques afin d&rsquo;acc\u00e9der aux donn\u00e9es de votre entreprise.<\/p>\n<p>Les solutions antivirus traditionnelles ne sont pas capables de d\u00e9tecter et de prot\u00e9ger contre les menaces sophistiqu\u00e9es actuelles, car elles se comparent uniquement \u00e0 une base de donn\u00e9es de fichiers malveillants connus. Une solution EDR (Endpoint Detection and Response) utilise des algorithmes avanc\u00e9s d&rsquo;apprentissage automatique et une analyse comportementale pour d\u00e9tecter et contrecarrer les menaces sophistiqu\u00e9es.<\/p>\n<p>La technologie que nous utilisons, Sentinel One, d\u00e9tecte des milliers de virus et de variantes de logiciels malveillants, notamment les attaques Zero Day et de cryptominage, quel que soit l&rsquo;endroit o\u00f9 vos points finaux sont d\u00e9ploy\u00e9s (bureau, domicile, a\u00e9roport, caf\u00e9, h\u00f4tel, etc.).<\/p>\n<p>La solution EDR est g\u00e9r\u00e9e en externe par notre SOC (Security Operations Center) qui surveille, analyse et r\u00e9pond \u00e0 vos alertes 24h\/24 et 7j\/7. Lorsqu&rsquo;un comportement suspect est d\u00e9tect\u00e9, il g\u00e9n\u00e8re une alerte que l&rsquo;\u00e9quipe SOC analyse et g\u00e8re pour vous. Lorsqu\u2019un comportement malveillant est d\u00e9tect\u00e9 avec certitude, le logiciel bloque imm\u00e9diatement le fichier ou l\u2019action en question avant qu\u2019il ne puisse pas se propager.<\/p>\n<p>Cette solution abordable, avec un mod\u00e8le de facturation mensuelle par r\u00e9partition, garantira le niveau le plus \u00e9lev\u00e9 possible de protection des points finaux, essentiel \u00e0 la s\u00e9curit\u00e9 des donn\u00e9es de votre organisation.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row_content\u00a0\u00bb bg_type=\u00a0\u00bbbg_color\u00a0\u00bb el_class=\u00a0\u00bbtilt-pos-3-deg\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1588250693452{padding-top: 25px !important;padding-bottom: 25px !important;}\u00a0\u00bb bg_color_value=\u00a0\u00bb#16a361&Prime;][vc_column]<div id=\"ultimate-heading-678669f44c583a25f\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-678669f44c583a25f uvc-3178 \" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-678669f44c583a25f h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:normal;\">Contactez un expert en s\u00e9curit\u00e9 TI<\/h3><\/div><\/div>[vc_empty_space]<div class=\" ubtn-ctn-center \"><a class=\"ubtn-link ult-adjust-bottom-margin ubtn-center ubtn-large \" href=\"\/fr\/contactez-nos-experts-en-cybersecurite\/\" title=\"Contactez Present\" ><button type=\"button\" id=\"ubtn-6027\"  class=\"ubtn ult-adjust-bottom-margin ult-responsive ubtn-large ubtn-no-hover-bg  none  ubtn-center   tooltip-69f44c583a2b4\"  data-hover=\"#ffffff\" data-border-color=\"#ffffff\" data-bg=\"#ffffff\" data-hover-bg=\"#000000\" data-border-hover=\"#ffffff\" data-shadow-hover=\"\" data-shadow-click=\"none\" data-shadow=\"\" data-shd-shadow=\"\"  data-ultimate-target='#ubtn-6027'  data-responsive-json-new='{\"font-size\":\"desktop:18px;\",\"line-height\":\"desktop:24px;\"}'  style=\"font-weight:bold;border-radius:5px;border-width:3px;border-color:#ffffff;border-style:solid;background: #ffffff;color: #16a361;\"><span class=\"ubtn-hover\" style=\"background-color:#000000\"><\/span><span class=\"ubtn-data ubtn-text \" >Parlons-en<\/span><\/button><\/a><\/div>[\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<p>[\/vc_column_text]<div id=\"ultimate-heading-793569f44c583a332\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-793569f44c583a332 uvc-6325 \" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-793569f44c583a332 .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;\"><\/p>\n<div>\n<h3 align=\"center\">Present\u2019s Security Operation Center (SOC)<\/h3>\n<\/div>\n<p><\/div><\/div>[vc_row_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime;][vc_column_text]<\/p>\n<h4><strong>D\u00e9tection des menaces<\/strong><\/h4>\n<p>Notre solution reconna\u00eet imm\u00e9diatement des milliers de virus et de variantes d&rsquo;attaques de logiciels malveillants, y compris les attaques de cryptominage, ainsi que les causes profondes de ces comportements malveillants, en identifiant et en diagnostiquant rapidement les processus sources et les param\u00e8tres syst\u00e8me corrompus.<\/p>\n<p>Notre SOC analyse les applications et fichiers mis en quarantaine, r\u00e9duisant ainsi les faux positifs et assurant une protection compl\u00e8te. Nous nous occupons des d\u00e9fis de la cybers\u00e9curit\u00e9 pendant que vous vous concentrez sur votre entreprise.<\/p>\n<h4><strong>R\u00e9ponse et correction<\/strong><\/h4>\n<p>Lorsqu&rsquo;un comportement malveillant est d\u00e9tect\u00e9, notre solution de s\u00e9curit\u00e9 des points finaux restaurera rapidement les fichiers vers les versions s\u00e9curis\u00e9es pr\u00e9c\u00e9dentes en suivant les modifications apport\u00e9es \u00e0 vos appareils et en les restaurant \u00e0 un \u00e9tat de risque acceptable.<\/p>\n<h4><strong>S\u00e9curit\u00e9 des points de terminaison de nouvelle g\u00e9n\u00e9ration<\/strong><\/h4>\n<p>Notre solution de s\u00e9curit\u00e9 des points finaux utilise la plateforme brevet\u00e9e SentinelOne pour sa technologie unique de d\u00e9tection et de correction des logiciels malveillants. Cette solution int\u00e8gre la pr\u00e9vention la plus innovante du secteur, offrant une visibilit\u00e9 sur les causes profondes et les origines de la menace, annulant les op\u00e9rations malveillantes et les corrigeant \u00e0 une vitesse agile selon les besoins.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime;][vc_column_text]<\/p>\n<h4><strong>Op\u00e9rations de s\u00e9curit\u00e9 \u00e0 la demande<\/strong><\/h4>\n<p>Nous fournissons un centre d&rsquo;op\u00e9rations de s\u00e9curit\u00e9 (SOC) qui adapte la protection \u00e0 votre entreprise, en fournissant le personnel n\u00e9cessaire pour g\u00e9rer les menaces.<\/p>\n<h4><strong>Couverture contre les menaces toujours disponible<\/strong><\/h4>\n<p>Notre technologie d\u00e9tecte toutes les menaces connues et inconnues en tirant parti de la derni\u00e8re technologie bas\u00e9e sur le comportement (IA), quel que soit l&rsquo;endroit o\u00f9 vos points terminaux sont d\u00e9ploy\u00e9s (bureau, domicile, a\u00e9roport, caf\u00e9, h\u00f4tel, etc.).<\/p>\n<h4><strong>D\u00e9tection et correction des menaces de nouvelle g\u00e9n\u00e9ration<\/strong><\/h4>\n<p>Notre solution int\u00e8gre une technologie brevet\u00e9e d&rsquo;identification et de rem\u00e9diation des menaces, pour prot\u00e9ger enti\u00e8rement les environnements de bureau et de serveur pour Windows, Mac et Linux, ainsi que les serveurs virtualis\u00e9s dans AWS &amp; Azure, VMWare, Citrix, VirtualBox et Hyper-V.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space][vc_row_inner][vc_column_inner width=\u00a0\u00bb1\/6&Prime;][vc_empty_space][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb2\/3&Prime;]<div id=\"ultimate-heading-506169f44c583a375\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-506169f44c583a375 uvc-8723 \" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-506169f44c583a375 .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;\"><\/p>\n<h4>Pourquoi avez-vous besoin d\u2019un EDR combin\u00e9 \u00e0 notre SOC\u00a0?<\/h4>\n<p><\/div><\/div><div id=\"ultimate-video-586669f44c583a3bf\" class=\"ult-video  ult-adjust-bottom-margin ultimate-video-586669f44c583a3bf ultv-8869 \"><div class=\"ultv-video ultv-aspect-ratio-16_9 ultv-subscribe-responsive-none\" data-videotype=\"uv_iframe\">\r\n\t\t\t\t\t\t<div class=\"ultv-video__outer-wrap\" data-autoplay=\"0\" data-device=\"false\"  data-iconbg=\"#3A3A3A\" data-overcolor=\"\" data-defaultbg=\"#1f1f1e\" data-defaultplay=\"defaulticon\"><div class=\"ultv-video__play\" data-src=\"https:\/\/www.youtube.com\/embed\/ublwNijbqww?rel=0&amp;start&amp;end&amp;controls=1&amp;mute=0&amp;modestbranding=0&amp;autoplay=1\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"ultv-video__thumb\" src=\"https:\/\/www.present.ca\/wp-content\/uploads\/2021\/06\/Screen-Shot-2021-06-01-at-2.55.21-PM.png\"\/>\r\n\t\t\t\t\t\t\t\t<div class=\"ultv-video__play-icon  ultv-animation-none\" style=\"width:75px\"><svg height=\"100%\" version=\"1.1\" viewBox=\"0 0 68 48\" width=\"100%\"><path class=\"ultv-youtube-icon-bg\" d=\"m .66,37.62 c 0,0 .66,4.70 2.70,6.77 2.58,2.71 5.98,2.63 7.49,2.91 5.43,.52 23.10,.68 23.12,.68 .00,-1.3e-5 14.29,-0.02 23.81,-0.71 1.32,-0.15 4.22,-0.17 6.81,-2.89 2.03,-2.07 2.70,-6.77 2.70,-6.77 0,0 .67,-5.52 .67,-11.04 l 0,-5.17 c 0,-5.52 -0.67,-11.04 -0.67,-11.04 0,0 -0.66,-4.70 -2.70,-6.77 C 62.03,.86 59.13,.84 57.80,.69 48.28,0 34.00,0 34.00,0 33.97,0 19.69,0 10.18,.69 8.85,.84 5.95,.86 3.36,3.58 1.32,5.65 .66,10.35 .66,10.35 c 0,0 -0.55,4.50 -0.66,9.45 l 0,8.36 c .10,4.94 .66,9.45 .66,9.45 z\" fill=\"#1f1f1e\" ><\/path><path d=\"m 26.96,13.67 18.37,9.62 -18.37,9.55 -0.00,-19.17 z\" fill=\"#fff\"><\/path><path d=\"M 45.02,23.46 45.32,23.28 26.96,13.67 43.32,22.34 45.02,23.46 z\" fill=\"#ccc\"><\/path><\/svg><\/div> <\/div> <\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/6&Prime;][vc_empty_space][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=\u00a0\u00bb1\/6&Prime;][vc_empty_space][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb2\/3&Prime;][vc_column_text]<\/p>\n<h3 style=\"text-align: center;\"><strong>OBTENEZ UN DEVIS MAINTENANT<\/strong><\/h3>\n<p style=\"text-align: center;\">Remplissez le formulaire ci-dessous pour recevoir un devis sous 24 heures. D\u00e9couvrez comment garantir le niveau le plus \u00e9lev\u00e9 possible de protection des points finaux pour un tarif mensuel abordable.<\/p>\n<p>[\/vc_column_text]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f22271-o1\" lang=\"fr-FR\" dir=\"ltr\" data-wpcf7-id=\"22271\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/fr\/wp-json\/wp\/v2\/pages\/22554#wpcf7-f22271-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Formulaire de contact\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"22271\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"fr_FR\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f22271-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<p><label> Nom<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n<\/p>\n<p><label> Courriel (*email professionnel uniquement)<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n<\/p>\n<p><label> Nombre de endpoints (PCs et serveurs)<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"text-200\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"text-200\" \/><\/span><br \/>\n<input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Soumettre\" \/><\/label>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/6&Prime;][vc_empty_space][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_empty_space][vc_column_text]Chaque jour, des milliers de points terminaux sont compromis par les cybercriminels, car ils restent la porte d&rsquo;entr\u00e9e la plus simple pour les pirates informatiques afin d&rsquo;acc\u00e9der aux donn\u00e9es de votre entreprise. Les solutions antivirus traditionnelles ne sont pas capables de d\u00e9tecter et de prot\u00e9ger contre les menaces sophistiqu\u00e9es actuelles, car elles se comparent uniquement [&#8230;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":20134,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_wp_rev_ctl_limit":""},"class_list":["post-22554","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protection des points terminaux - Present<\/title>\n<meta name=\"description\" content=\"Enti\u00e8rement surveill\u00e9e et g\u00e9r\u00e9e par notre SOC 24h\/7, la protection des terminaux fournit une solution avanc\u00e9e de d\u00e9tection des menaces et de d\u00e9fense bas\u00e9e sur le comportement.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.present.ca\/fr\/solutions\/securite-geree-ti\/protection-des-points-terminaux\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protection des points terminaux - Present\" \/>\n<meta property=\"og:description\" content=\"Enti\u00e8rement surveill\u00e9e et g\u00e9r\u00e9e par notre SOC 24h\/7, la protection des terminaux fournit une solution avanc\u00e9e de d\u00e9tection des menaces et de d\u00e9fense bas\u00e9e sur le comportement.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.present.ca\/fr\/solutions\/securite-geree-ti\/protection-des-points-terminaux\/\" \/>\n<meta property=\"og:site_name\" content=\"Present\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-29T14:06:26+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.present.ca\\\/fr\\\/solutions\\\/securite-geree-ti\\\/protection-des-points-terminaux\\\/\",\"url\":\"https:\\\/\\\/www.present.ca\\\/fr\\\/solutions\\\/securite-geree-ti\\\/protection-des-points-terminaux\\\/\",\"name\":\"Protection des points terminaux - Present\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.present.ca\\\/fr\\\/#website\"},\"datePublished\":\"2021-05-26T19:00:12+00:00\",\"dateModified\":\"2024-05-29T14:06:26+00:00\",\"description\":\"Enti\u00e8rement surveill\u00e9e et g\u00e9r\u00e9e par notre SOC 24h\\\/7, la protection des terminaux fournit une solution avanc\u00e9e de d\u00e9tection des menaces et de d\u00e9fense bas\u00e9e sur le comportement.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.present.ca\\\/fr\\\/solutions\\\/securite-geree-ti\\\/protection-des-points-terminaux\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.present.ca\\\/fr\\\/solutions\\\/securite-geree-ti\\\/protection-des-points-terminaux\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.present.ca\\\/fr\\\/solutions\\\/securite-geree-ti\\\/protection-des-points-terminaux\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.present.ca\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/www.present.ca\\\/fr\\\/solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"S\u00e9curit\u00e9 G\u00e9r\u00e9e TI\",\"item\":\"https:\\\/\\\/www.present.ca\\\/fr\\\/solutions\\\/securite-geree-ti\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Protection des points terminaux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.present.ca\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.present.ca\\\/fr\\\/\",\"name\":\"Present\",\"description\":\"Services G\u00e9r\u00e9s TI, S\u00e9curit\u00e9 G\u00e9r\u00e9e TI et Solutions de Cloud Hybride\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.present.ca\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protection des points terminaux - Present","description":"Enti\u00e8rement surveill\u00e9e et g\u00e9r\u00e9e par notre SOC 24h\/7, la protection des terminaux fournit une solution avanc\u00e9e de d\u00e9tection des menaces et de d\u00e9fense bas\u00e9e sur le comportement.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.present.ca\/fr\/solutions\/securite-geree-ti\/protection-des-points-terminaux\/","og_locale":"fr_FR","og_type":"article","og_title":"Protection des points terminaux - Present","og_description":"Enti\u00e8rement surveill\u00e9e et g\u00e9r\u00e9e par notre SOC 24h\/7, la protection des terminaux fournit une solution avanc\u00e9e de d\u00e9tection des menaces et de d\u00e9fense bas\u00e9e sur le comportement.","og_url":"https:\/\/www.present.ca\/fr\/solutions\/securite-geree-ti\/protection-des-points-terminaux\/","og_site_name":"Present","article_modified_time":"2024-05-29T14:06:26+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.present.ca\/fr\/solutions\/securite-geree-ti\/protection-des-points-terminaux\/","url":"https:\/\/www.present.ca\/fr\/solutions\/securite-geree-ti\/protection-des-points-terminaux\/","name":"Protection des points terminaux - Present","isPartOf":{"@id":"https:\/\/www.present.ca\/fr\/#website"},"datePublished":"2021-05-26T19:00:12+00:00","dateModified":"2024-05-29T14:06:26+00:00","description":"Enti\u00e8rement surveill\u00e9e et g\u00e9r\u00e9e par notre SOC 24h\/7, la protection des terminaux fournit une solution avanc\u00e9e de d\u00e9tection des menaces et de d\u00e9fense bas\u00e9e sur le comportement.","breadcrumb":{"@id":"https:\/\/www.present.ca\/fr\/solutions\/securite-geree-ti\/protection-des-points-terminaux\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.present.ca\/fr\/solutions\/securite-geree-ti\/protection-des-points-terminaux\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.present.ca\/fr\/solutions\/securite-geree-ti\/protection-des-points-terminaux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.present.ca\/fr\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/www.present.ca\/fr\/solutions\/"},{"@type":"ListItem","position":3,"name":"S\u00e9curit\u00e9 G\u00e9r\u00e9e TI","item":"https:\/\/www.present.ca\/fr\/solutions\/securite-geree-ti\/"},{"@type":"ListItem","position":4,"name":"Protection des points terminaux"}]},{"@type":"WebSite","@id":"https:\/\/www.present.ca\/fr\/#website","url":"https:\/\/www.present.ca\/fr\/","name":"Present","description":"Services G\u00e9r\u00e9s TI, S\u00e9curit\u00e9 G\u00e9r\u00e9e TI et Solutions de Cloud Hybride","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.present.ca\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.present.ca\/fr\/wp-json\/wp\/v2\/pages\/22554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.present.ca\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.present.ca\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.present.ca\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.present.ca\/fr\/wp-json\/wp\/v2\/comments?post=22554"}],"version-history":[{"count":4,"href":"https:\/\/www.present.ca\/fr\/wp-json\/wp\/v2\/pages\/22554\/revisions"}],"predecessor-version":[{"id":29094,"href":"https:\/\/www.present.ca\/fr\/wp-json\/wp\/v2\/pages\/22554\/revisions\/29094"}],"up":[{"embeddable":true,"href":"https:\/\/www.present.ca\/fr\/wp-json\/wp\/v2\/pages\/20134"}],"wp:attachment":[{"href":"https:\/\/www.present.ca\/fr\/wp-json\/wp\/v2\/media?parent=22554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}