{"id":31826,"date":"2018-01-16T18:08:52","date_gmt":"2018-01-16T17:08:52","guid":{"rendered":"https:\/\/www.retarus.com\/fr\/?post_type=project&p=31826"},"modified":"2024-05-17T10:05:39","modified_gmt":"2024-05-17T08:05:39","slug":"use-case-advanced-threat-protection","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/fr\/use-case-advanced-threat-protection\/","title":{"rendered":"Advanced Threat Protection avec Retarus Email Security"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"Les attaquants recourent de plus en plus \u00e0 l'ing\u00e9nierie sociale pour r\u00e9aliser des attaques qui comportent un risque de pr\u00e9judice financier pour les entreprises. Par exemple, dans le cas de\u2026","protected":false},"author":3,"featured_media":32980,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"[et_pb_section bb_built=\"1\" fullwidth=\"on\" specialty=\"off\" background_image=\"https:\/\/www.retarus.com\/de\/wp-content\/uploads\/sites\/2\/2018\/01\/atp-background-image.png\" inner_shadow=\"on\" _builder_version=\"3.0.100\" next_background_color=\"rgba(255,255,255,0)\" inner_width=\"auto\" inner_max_width=\"none\"][et_pb_fullwidth_header background_overlay_color=\"rgba(58,149,188,0.24)\" _builder_version=\"3.19.7\" max_width_tablet=\"50px\" background_color=\"rgba(255, 255, 255, 0)\" button_one_text_size__hover_enabled=\"off\" button_one_text_size__hover=\"null\" button_two_text_size__hover_enabled=\"off\" button_two_text_size__hover=\"null\" button_one_text_color__hover_enabled=\"off\" button_one_text_color__hover=\"null\" button_two_text_color__hover_enabled=\"off\" button_two_text_color__hover=\"null\" button_one_border_width__hover_enabled=\"off\" button_one_border_width__hover=\"null\" button_two_border_width__hover_enabled=\"off\" button_two_border_width__hover=\"null\" button_one_border_color__hover_enabled=\"off\" button_one_border_color__hover=\"null\" button_two_border_color__hover_enabled=\"off\" button_two_border_color__hover=\"null\" button_one_border_radius__hover_enabled=\"off\" button_one_border_radius__hover=\"null\" button_two_border_radius__hover_enabled=\"off\" button_two_border_radius__hover=\"null\" button_one_letter_spacing__hover_enabled=\"off\" button_one_letter_spacing__hover=\"null\" button_two_letter_spacing__hover_enabled=\"off\" button_two_letter_spacing__hover=\"null\" button_one_bg_color__hover_enabled=\"off\" button_one_bg_color__hover=\"null\" button_two_bg_color__hover_enabled=\"off\" button_two_bg_color__hover=\"null\"]\r\n

Advanced Threat Protection<\/span>\u00ab\u00a0Fraude au pr\u00e9sident\u00a0\u00bb, hame\u00e7onnage, ransomware\u00a0: Une protection robuste contre les menaces complexes<\/h1>\r\n[\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section bb_built=\"1\" admin_label=\"section\" background_color=\"rgba(255,255,255,0)\" disabled=\"off\" disabled_on=\"off|off|off\" custom_padding_tablet=\"50px|0|50px|0\" custom_padding_last_edited=\"on|desktop\" prev_background_color=\"#FFFFFF\" next_background_color=\"#FFFFFF\" _builder_version=\"3.17.6\" module_id=\"secmenu\" inner_width=\"auto\" inner_max_width=\"none\"][et_pb_row admin_label=\"row\" background_position=\"top_left\" background_repeat=\"repeat\" background_size=\"initial\" _builder_version=\"3.17.6\" width=\"80%\" max_width=\"1080px\"][et_pb_column type=\"4_4\"][et_pb_text admin_label=\"secmenu\" background_layout=\"dark\" disabled=\"off\" disabled_on=\"off|off|\" background_position=\"top_left\" background_repeat=\"repeat\" background_size=\"initial\" _builder_version=\"3.17.6\" module_alignment=\"left\"]\r\n[content type=\"contblock\" name=\"secmenu-usecases\"]\r\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section bb_built=\"1\" fullwidth=\"off\" specialty=\"off\" prev_background_color=\"rgba(255,255,255,0)\" next_background_color=\"#ffffff\" inner_width=\"auto\" inner_max_width=\"none\"][et_pb_row background_position=\"top_left\" background_repeat=\"repeat\" background_size=\"initial\" width=\"80%\" max_width=\"1080px\"][et_pb_column type=\"4_4\"][et_pb_divider color=\"#ffffff\" show_divider=\"off\" height=\"20\" divider_style=\"solid\" divider_position=\"top\" hide_on_mobile=\"on\" disabled_on=\"on|on|off\" \/][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section bb_built=\"1\" fullwidth=\"off\" specialty=\"off\" _builder_version=\"3.0.100\" background_color=\"#ffffff\" module_class=\"cc-seccomp\" prev_background_color=\"#FFFFFF\" next_background_color=\"#FFFFFF\" inner_width=\"auto\" inner_max_width=\"none\"][et_pb_row background_position=\"top_left\" background_repeat=\"repeat\" background_size=\"initial\" width=\"80%\" max_width=\"1080px\"][et_pb_column type=\"2_3\"][et_pb_text admin_label=\"Challenge - Background - Solution\" background_position=\"top_left\" background_repeat=\"repeat\" background_size=\"initial\" _builder_version=\"3.19.7\" module_alignment=\"left\"]\r\n

D\u00e9fi<\/h2>\r\nDe nos jours, les messages ind\u00e9sirables repr\u00e9sentent la majeure partie des courriers \u00e9lectroniques\u00a0: en plus du flux habituel d'e-mails contenant des spams et des virus, les entreprises et les employ\u00e9s sont de plus en plus expos\u00e9s \u00e0 des menaces complexes telles que l'ing\u00e9nierie sociale et les tentatives de hame\u00e7onnage. Face \u00e0 ces e-mails individuels, les m\u00e9canismes traditionnels de s\u00e9curit\u00e9 n'offrent pas de protection suffisamment efficace. En outre, les programmes malveillants sont \u00e9galement modifi\u00e9s \u00e0 des intervalles de plus en plus courts et de nouvelles variantes ne cessent de se d\u00e9velopper.\r\n

Contexte<\/h2>\r\nLorsqu'elles apparaissent pour la premi\u00e8re fois, les nouvelles menaces qui p\u00e8sent sur les antivirus sont naturellement inconnues. Comme il n'existe toujours pas de signatures appropri\u00e9es, les e-mails infect\u00e9s se propagent en tr\u00e8s peu de temps. En plus de cette dynamique, les cybercriminels utilisent des m\u00e9thodes de plus en plus sophistiqu\u00e9es dans le but d'avoir acc\u00e8s \u00e0 des informations sensibles. Les solutions de s\u00e9curit\u00e9 traditionnelles ont du mal \u00e0 distinguer ce type d'e-mails des messages l\u00e9gitimes. Les attaques r\u00e9ussies entra\u00eenent non seulement de graves pertes de donn\u00e9es et des d\u00e9faillances massives du syst\u00e8me, mais \u00e9galement d'\u00e9normes co\u00fbts et une atteinte \u00e0 la r\u00e9putation de la victime. Il est donc urgent pour les entreprises d'adapter leurs concepts de s\u00e9curit\u00e9 informatique \u00e0 la situation actuelle.\r\n

La solution pour se prot\u00e9ger contre les attaques cibl\u00e9es<\/h2>\r\nLa solution Essential Protection<\/strong> de Retarus Email Security<\/strong><\/a> acc\u00e8de d\u00e9j\u00e0 \u00e0 des m\u00e9canismes de protection complets et jusqu'\u00e0 quatre antivirus diff\u00e9rents, filtrant la majorit\u00e9 des e-mails dangereux de mani\u00e8re fiable. Avec Advanced Threat Protection (ATP)<\/strong>, les entreprises peuvent se prot\u00e9ger contre les menaces qui vont au-del\u00e0 des virus traditionnels et des spams gr\u00e2ce \u00e0 une foule de fonctionnalit\u00e9s suppl\u00e9mentaires.\r\n[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\"][et_pb_divider height=\"45\" divider_style=\"solid\" divider_position=\"top\" hide_on_mobile=\"on\" _builder_version=\"3.0.94\" disabled_on=\"on|on|off\" color=\"#ffffff\" show_divider=\"off\" \/][et_pb_text admin_label=\"Kundennutzen\" module_class=\"ret_check cc-seccomp\" max_width_last_edited=\"off|\" background_color=\"#e6eaed\" custom_margin=\"20px|||\" custom_padding=\"30px|30px|30px|30px\" custom_padding_phone=\"20px|20px|20px|20px\" custom_padding_last_edited=\"on|phone\" background_position=\"top_left\" background_repeat=\"repeat\" background_size=\"initial\" _builder_version=\"3.17.6\" module_alignment=\"left\"]\r\n

Avantages client<\/h2>\r\n