{"id":8068,"date":"2021-09-23T11:08:37","date_gmt":"2021-09-23T09:08:37","guid":{"rendered":"https:\/\/www.asecus.ch\/non-classifiee-fr\/ransomware-haben-antivirus-loesungen-ausgedient\/"},"modified":"2022-02-14T15:47:28","modified_gmt":"2022-02-14T14:47:28","slug":"ransomware-haben-antivirus-loesungen-ausgedient","status":"publish","type":"post","link":"https:\/\/www.asecus.ch\/fr\/news\/ransomware-haben-antivirus-loesungen-ausgedient\/","title":{"rendered":"L&rsquo;antivirus a fait son temps?"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1qp9h-13b94f35e055b5f7e336d5a30f3a6b20\">\n.avia-section.av-1qp9h-13b94f35e055b5f7e336d5a30f3a6b20{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.asecus.ch\/wp-content\/uploads\/2020\/08\/header_ueber-uns.png);\nbackground-position:50% 0%;\nbackground-attachment:scroll;\n}\n.avia-section.av-1qp9h-13b94f35e055b5f7e336d5a30f3a6b20 .av-section-color-overlay{\nopacity:0.6;\nbackground-color:#05668d;\n}\n<\/style>\n<div id='mobile-max-heigth'  class='avia-section av-1qp9h-13b94f35e055b5f7e336d5a30f3a6b20 main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_textblock  avia-builder-el-first  hero-container avia-bg-style-scroll av-section-color-overlay-active av-minimum-height av-minimum-height-custom av-height-custom  container_wrap fullsize'  data-section-bg-repeat='no-repeat' data-av_minimum_height_px='250'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' style='height:250px'><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-8068'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kzmt615t-add0241502156828f0e45a4eae990cc3\">\n#top .av-special-heading.av-kzmt615t-add0241502156828f0e45a4eae990cc3{\npadding-bottom:0;\ncolor:#ffffff;\nfont-size:70px;\n}\nbody .av-special-heading.av-kzmt615t-add0241502156828f0e45a4eae990cc3 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-kzmt615t-add0241502156828f0e45a4eae990cc3 .av-special-heading-tag{\nfont-size:70px;\n}\n.av-special-heading.av-kzmt615t-add0241502156828f0e45a4eae990cc3 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-kzmt615t-add0241502156828f0e45a4eae990cc3 .av-subheading{\nfont-size:18px;\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-kzmt615t-add0241502156828f0e45a4eae990cc3 .av-special-heading-tag{\nfont-size:25px;\n}\n.av-special-heading.av-kzmt615t-add0241502156828f0e45a4eae990cc3 .av-subheading{\ndisplay:none;\n}\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-kzmt615t-add0241502156828f0e45a4eae990cc3 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-kzmt615t-add0241502156828f0e45a4eae990cc3 av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-1  avia-builder-el-no-sibling  top-special-heading av-inherit-size'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Les solutions antivirus ont-elles fait leur temps?<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-8068'><div class='entry-content-wrapper clearfix'><section  class='av_textblock_section av-kdon9vit-a75c57b837ec5678aff65f78eff08161 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div class=\"breadcrumb breadcrumbs avia-breadcrumbs\"><div class=\"breadcrumb-trail\" ><span class=\"trail-before\"><span class=\"breadcrumb-title\">Vous \u00eates ici :<\/span><\/span> <span  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BreadcrumbList\" ><span  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ListItem\" itemprop=\"itemListElement\" ><a itemprop=\"url\" href=\"https:\/\/www.asecus.ch\/fr\/\" title=\"Asecus\" rel=\"home\" class=\"trail-begin\"><span itemprop=\"name\">Accueil<\/span><\/a><span itemprop=\"position\" class=\"hidden\">1<\/span><\/span><\/span> <span class=\"sep\">\/<\/span> <span  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BreadcrumbList\" ><span  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ListItem\" itemprop=\"itemListElement\" ><a itemprop=\"url\" href=\"https:\/\/www.asecus.ch\/fr\/news\/ransomware-haben-antivirus-loesungen-ausgedient\/\" title=\"L&rsquo;antivirus a fait son temps?\"><span itemprop=\"name\">L&rsquo;antivirus a fait son temps?<\/span><\/a><span itemprop=\"position\" class=\"hidden\">2<\/span><\/span><\/span><\/div><\/div>\n<\/div><\/section><\/p>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kcom12tj-524b27619b124ade1fe89cdccca84ac0\">\n.avia-section.av-kcom12tj-524b27619b124ade1fe89cdccca84ac0{\nmargin-top:0px;\nmargin-bottom:0px;\n}\n<\/style>\n<div id='av_section_2'  class='avia-section av-kcom12tj-524b27619b124ade1fe89cdccca84ac0 alternate_color avia-section-no-padding avia-no-border-styling  avia-builder-el-3  el_after_av_textblock  el_before_av_hr  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-8068'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1magt-06e475b6cf22ffa09d392d67ae562de8\">\n.flex_column.av-1magt-06e475b6cf22ffa09d392d67ae562de8{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-1magt-06e475b6cf22ffa09d392d67ae562de8 av_one_full  avia-builder-el-4  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kty3pyev-6a8a19dd35aa204ccacc6b139976d90c\">\n#top .hr.av-kty3pyev-6a8a19dd35aa204ccacc6b139976d90c{\nmargin-top:0px;\nmargin-bottom:10px;\n}\n.hr.av-kty3pyev-6a8a19dd35aa204ccacc6b139976d90c .hr-inner{\nwidth:50px;\n}\n<\/style>\n<div  class='hr av-kty3pyev-6a8a19dd35aa204ccacc6b139976d90c hr-custom  avia-builder-el-5  el_before_av_textblock  avia-builder-el-first  hr-center hr-icon-no'><span class='hr-inner inner-border-av-border-none'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-ktwl2mla-7ebebab4d8f7e28cd96a46f36ebe5f86 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Ransomware malgr\u00e9 une solution antivirus<\/h3>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-kdive95n-060e3250ff84a9964101af68c7bd49d1 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Le ransomware est actuellement l&rsquo;une des m\u00e9thodes d&rsquo;attaque les plus populaires des cybercriminels. Les fichiers sont crypt\u00e9s dans le but d&rsquo;extorquer une ran\u00e7on aux entreprises. Les entreprises victimes d&rsquo;une campagne de ransomware peuvent r\u00e9pondre \u00e0 de telles demandes de ran\u00e7on en esp\u00e9rant que les donn\u00e9es crypt\u00e9es seront r\u00e9cup\u00e9r\u00e9es dans un d\u00e9lai raisonnable. Il convient de noter que le d\u00e9cryptage proprement dit des donn\u00e9es ou la restauration des donn\u00e9es \u00e0 partir de sauvegardes constituent le moindre probl\u00e8me. La d\u00e9faillance des syst\u00e8mes informatiques qui fournissent des services de base n\u00e9cessite souvent beaucoup plus de temps pour une restauration r\u00e9ussie. Depuis 2019, les pirates vont encore plus loin. Avec la tactique dite de la double extorsion, les donn\u00e9es ne sont pas seulement crypt\u00e9es, mais aussi vol\u00e9es. Un client qui refuse de payer une ran\u00e7on correspondante est d\u00e9sormais \u00e9galement menac\u00e9 de voir ses donn\u00e9es publi\u00e9es. Les entreprises disposant de processus de sauvegarde et de r\u00e9cup\u00e9ration appropri\u00e9s risquent de voir les donn\u00e9es de leurs clients publi\u00e9es et leur image de marque ternie par cette nouvelle tactique.<\/p>\n<p>La Suisse est une cible int\u00e9ressante : 46% des entreprises suisses interrog\u00e9es par Sophos ont d\u00e9clar\u00e9 avoir \u00e9t\u00e9 victimes d&rsquo;une attaque de ransomware au moins une fois au cours de l&rsquo;ann\u00e9e derni\u00e8re. C&rsquo;est 9 % de plus que la moyenne mondiale. Le Centre national pour la cybers\u00e9curit\u00e9 (NCSC) met \u00e9galement en garde les PME en particulier contre les dangers des ransomwares. En effet, 80% des attaques signal\u00e9es en Suisse ont \u00e9t\u00e9 perp\u00e9tr\u00e9es contre des PME.<\/p>\n<p><strong>Pourquoi tant d&rsquo;entreprises sont-elles victimes d&rsquo;une attaque de ransomware et pourquoi les solutions antivirus traditionnelles n&rsquo;offrent-elles pas une protection ad\u00e9quate contre les ransomwares?<\/strong><\/p>\n<p>Les premiers logiciels antivirus identifient des virus \u00e0 l\u2019aide de signature du code malicieux. Cette m\u00e9thode de d\u00e9tection peut toutefois \u00eatre tr\u00e8s facilement contourn\u00e9e par les attaquants en modifiant l\u00e9g\u00e8rement le code malveillant.<\/p>\n<p>L&rsquo;\u00e9tape suivante de l&rsquo;\u00e9volution a \u00e9t\u00e9 l&rsquo;arriv\u00e9e sur le march\u00e9 des \u00ab\u00a0Endpoint Protection Plattforms\u00a0\u00bb (EPP). Outre les signatures, elles utilisent l&rsquo;apprentissage automatique, l&rsquo;analyse comportementale, le sandboxing et d&rsquo;autres moyens pour garantir la protection de l\u2019\u00e9quipement. Les solutions EPP modernes offrent la meilleure protection contre les menaces connues et inconnues, mais constituent la derni\u00e8re ligne de d\u00e9fense.<\/p>\n<p>Les attaquants de ransomware ne se contentent pas de chiffrer les \u00e9quipements individuels ou leurs donn\u00e9es accessibles. Ils se d\u00e9placent sur le r\u00e9seau, obtiennent des droits \u00e9lev\u00e9s et compromettent des syst\u00e8mes critiques. Le logiciel de cryptage est ainsi diffus\u00e9 sur tous les syst\u00e8mes accessibles. Les attaques sont command\u00e9es par des serveurs de commande et de contr\u00f4le.<\/p>\n<p>Les syst\u00e8mes EPP peuvent \u00eatre compl\u00e9t\u00e9s par des syst\u00e8mes \u00ab\u00a0Endpoint Detection and Response\u00a0\u00bb (EDR) et \u00ab\u00a0Network Detection and Response\u00a0\u00bb (NDR). Ils apportent une plus grande visibilit\u00e9 et peuvent d\u00e9tecter des attaques ou des processus inhabituels. De nombreux messages sans autre contexte rendent toutefois difficile la r\u00e9action efficace et rapide des \u00e9quipes de s\u00e9curit\u00e9 \u00e0 une attaque. Les solutions EDR et NDR se concentrent avant tout sur l&rsquo;aspect technologique et non sur les besoins op\u00e9rationnels des entreprises.<\/p>\n<p><strong>\u00c0 quoi ressemble une protection moderne contre les ransomwares ?<\/strong><\/p>\n<p>Dans l&rsquo;\u00e9volution des solutions de protection des terminaux, une nouvelle \u00e9tape importante a \u00e9t\u00e9 franchie en 2018 : \u00ab\u00a0Extended Detection and Response\u00a0\u00bb (XDR). Avec XDR, les diff\u00e9rents silos de donn\u00e9es sont bris\u00e9s et r\u00e9unis afin de garantir une protection holistique. Outre les donn\u00e9es du terminal, les donn\u00e9es du r\u00e9seau, des ressources cloud, de l&rsquo;IAM et d&rsquo;autres syst\u00e8mes sont \u00e9galement prises en compte. Ce regroupement des diff\u00e9rentes donn\u00e9es offre une meilleure visibilit\u00e9 et un meilleur contexte. Les menaces peuvent ainsi \u00eatre identifi\u00e9es plus rapidement et \u00e9limin\u00e9es avant que les dommages correspondants ne surviennent. Palo Alto Networks a invent\u00e9 le nom XDR en 2018 et reste aujourd&rsquo;hui encore le principal fabricant de solutions XDR.<\/p>\n<p>Cortex XDR de Palo Alto Networks offre aux entreprises des outils qui n&rsquo;\u00e9taient jusqu&rsquo;\u00e0 pr\u00e9sent disponibles que pour les sp\u00e9cialistes des centres op\u00e9rationnels de s\u00e9curit\u00e9 (SOC). Vous disposez ainsi d&rsquo;une plateforme puissante qui vous permet d&rsquo;avoir une visibilit\u00e9 sur tous les canaux et des outils pour intervenir en cas d&rsquo;attaque. Asecus peut vous aider \u00e0 configurer efficacement Cortex XDR et vous soutient dans l&rsquo;exploitation et la maintenance.<\/p>\n<\/div><\/section><\/p><\/div><\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='after_section_2'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-8068'><div class='entry-content-wrapper clearfix'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kty3pyev-6a8a19dd35aa204ccacc6b139976d90c\">\n#top .hr.av-kty3pyev-6a8a19dd35aa204ccacc6b139976d90c{\nmargin-top:0px;\nmargin-bottom:10px;\n}\n.hr.av-kty3pyev-6a8a19dd35aa204ccacc6b139976d90c .hr-inner{\nwidth:50px;\n}\n<\/style>\n<div  class='hr av-kty3pyev-6a8a19dd35aa204ccacc6b139976d90c hr-custom  avia-builder-el-8  el_after_av_section  el_before_av_textblock  avia-builder-el-first  hr-center hr-icon-no'><span class='hr-inner inner-border-av-border-none'><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p>\n<section  class='av_textblock_section av-ktybxmxq-4d1b3a9ce02c7d0e58a6c812aab66c54 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><strong>Nehmen Sie noch heute Kontakt mit unseren Experten auf!<\/strong><\/p>\n<\/div><\/section>\n<section class=\"asecus_hubspot_contact_form_section \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div id=\"hubspot_form\"><\/div><\/section>\n<div   data-autoplay=''  data-interval='5'  data-animation='fade'  data-show_slide_delay='90'  class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-11  el_after_asecus_hubspot_contact_form  avia-builder-el-last  '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class='avia-content-slider-inner'><div class='slide-entry-wrap'><article class='slide-entry flex_column  post-entry post-entry-11644 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.asecus.ch\/fr\/news\/du-wan-au-sd-wan-plus-dagilite-et-de-securite\/' data-rel='slide-1' class='slide-image' title='Du WAN au SD-WAN : plus d&rsquo;agilit\u00e9 et de s\u00e9curit\u00e9'><img decoding=\"async\" loading=\"lazy\" width=\"2048\" height=\"1366\" src=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/02\/sd-wan-2.png\" class=\"wp-image-11645 avia-img-lazy-loading-11645 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/02\/sd-wan-2.png 2048w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/02\/sd-wan-2-300x200.png 300w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/02\/sd-wan-2-1030x687.png 1030w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/02\/sd-wan-2-768x512.png 768w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/02\/sd-wan-2-1536x1025.png 1536w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" \/><\/a><div class='slide-content'><header class=\"entry-content-header\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.asecus.ch\/fr\/news\/du-wan-au-sd-wan-plus-dagilite-et-de-securite\/' title='Du WAN au SD-WAN : plus d&rsquo;agilit\u00e9 et de s\u00e9curit\u00e9'>Du WAN au SD-WAN : plus d&rsquo;agilit\u00e9 et de s\u00e9curit\u00e9<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-meta'><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-28T14:46:35+01:00\" >28 f\u00e9vrier 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Le SD-WAN repr\u00e9sente une alternative d'avenir qui \u00e9tend les r\u00e9seaux WAN traditionnels\u2026<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/02\/sd-wan-2.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1366<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2048<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Anton Dreher<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2023\/08\/asecus_logo_openFiles_RGB_logo_colored-300x80.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Anton Dreher<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-09-23T11:08:37+02:00\" >2025-02-28 14:46:35<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-02-28 14:46:35<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Du WAN au SD-WAN : plus d&rsquo;agilit\u00e9 et de s\u00e9curit\u00e9<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-11607 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.asecus.ch\/fr\/news\/microsoft-stellt-default-outbound-access-in-azure-ein\/' data-rel='slide-1' class='slide-image' title='Microsoft met fin au Default Outbound Access dans Azure'><img decoding=\"async\" loading=\"lazy\" width=\"2048\" height=\"858\" src=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/azure_outbound-1.jpg\" class=\"wp-image-11608 avia-img-lazy-loading-11608 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/azure_outbound-1.jpg 2048w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/azure_outbound-1-300x126.jpg 300w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/azure_outbound-1-1030x432.jpg 1030w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/azure_outbound-1-768x322.jpg 768w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/azure_outbound-1-1536x644.jpg 1536w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" \/><\/a><div class='slide-content'><header class=\"entry-content-header\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.asecus.ch\/fr\/news\/microsoft-stellt-default-outbound-access-in-azure-ein\/' title='Microsoft met fin au Default Outbound Access dans Azure'>Microsoft met fin au Default Outbound Access dans Azure<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-meta'><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-01-17T08:53:49+01:00\" >17 janvier 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Les clients Azure qui d\u00e9pendent jusqu'\u00e0 pr\u00e9sent du Default Outbound Access\u2026<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/azure_outbound-1.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>858<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2048<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Anton Dreher<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2023\/08\/asecus_logo_openFiles_RGB_logo_colored-300x80.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Anton Dreher<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-09-23T11:08:37+02:00\" >2025-01-17 08:53:49<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-01-17 08:55:09<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Microsoft met fin au Default Outbound Access dans Azure<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-11585 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.asecus.ch\/fr\/news\/ztna-lalternative-securisee-au-vpn-classique\/' data-rel='slide-1' class='slide-image' title='ZTNA : l&rsquo;alternative s\u00e9curis\u00e9e au VPN classique'><img decoding=\"async\" loading=\"lazy\" width=\"2048\" height=\"1366\" src=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/ztna-vpn-1.jpg\" class=\"wp-image-11587 avia-img-lazy-loading-11587 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/ztna-vpn-1.jpg 2048w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/ztna-vpn-1-300x200.jpg 300w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/ztna-vpn-1-1030x687.jpg 1030w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/ztna-vpn-1-768x512.jpg 768w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/ztna-vpn-1-1536x1025.jpg 1536w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" \/><\/a><div class='slide-content'><header class=\"entry-content-header\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.asecus.ch\/fr\/news\/ztna-lalternative-securisee-au-vpn-classique\/' title='ZTNA : l&rsquo;alternative s\u00e9curis\u00e9e au VPN classique'>ZTNA : l&rsquo;alternative s\u00e9curis\u00e9e au VPN classique<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-meta'><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-01-12T13:49:55+01:00\" >12 janvier 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >L'approche Zero Trust Network Access (ZTNA) offre une alternative d'avenir qui\u2026<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/ztna-vpn-1.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1366<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2048<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Anton Dreher<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2023\/08\/asecus_logo_openFiles_RGB_logo_colored-300x80.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Anton Dreher<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-09-23T11:08:37+02:00\" >2025-01-12 13:49:55<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-01-12 13:52:02<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>ZTNA : l&rsquo;alternative s\u00e9curis\u00e9e au VPN classique<\/span><\/span><\/span><\/article><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Dans le domaine de la protection des syst\u00e8mes d&rsquo;extr\u00e9mit\u00e9, les choses ont beaucoup \u00e9volu\u00e9 ces derni\u00e8res ann\u00e9es.<\/p>\n","protected":false},"author":9,"featured_media":8069,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[183],"tags":[212,194,213],"class_list":["post-8068","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-news-fr","tag-ransomware-fr","tag-socialengineering-fr"],"_links":{"self":[{"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/posts\/8068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/comments?post=8068"}],"version-history":[{"count":0,"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/posts\/8068\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/media\/8069"}],"wp:attachment":[{"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/media?parent=8068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/categories?post=8068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/tags?post=8068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}