{"id":31826,"date":"2018-01-16T18:08:52","date_gmt":"2018-01-16T17:08:52","guid":{"rendered":"https:\/\/www.retarus.com\/fr\/?post_type=project&p=31826"},"modified":"2024-05-17T10:05:39","modified_gmt":"2024-05-17T08:05:39","slug":"use-case-advanced-threat-protection","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/fr\/use-case-advanced-threat-protection\/","title":{"rendered":"Advanced Threat Protection avec Retarus Email Security"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"Les attaquants recourent de plus en plus \u00e0 l'ing\u00e9nierie sociale pour r\u00e9aliser des attaques qui comportent un risque de pr\u00e9judice financier pour les entreprises. Par exemple, dans le cas de\u2026","protected":false},"author":3,"featured_media":32980,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"[et_pb_section bb_built=\"1\" fullwidth=\"on\" specialty=\"off\" background_image=\"https:\/\/www.retarus.com\/de\/wp-content\/uploads\/sites\/2\/2018\/01\/atp-background-image.png\" inner_shadow=\"on\" _builder_version=\"3.0.100\" next_background_color=\"rgba(255,255,255,0)\" inner_width=\"auto\" inner_max_width=\"none\"][et_pb_fullwidth_header background_overlay_color=\"rgba(58,149,188,0.24)\" _builder_version=\"3.19.7\" max_width_tablet=\"50px\" background_color=\"rgba(255, 255, 255, 0)\" button_one_text_size__hover_enabled=\"off\" button_one_text_size__hover=\"null\" button_two_text_size__hover_enabled=\"off\" button_two_text_size__hover=\"null\" button_one_text_color__hover_enabled=\"off\" button_one_text_color__hover=\"null\" button_two_text_color__hover_enabled=\"off\" button_two_text_color__hover=\"null\" button_one_border_width__hover_enabled=\"off\" button_one_border_width__hover=\"null\" button_two_border_width__hover_enabled=\"off\" button_two_border_width__hover=\"null\" button_one_border_color__hover_enabled=\"off\" button_one_border_color__hover=\"null\" button_two_border_color__hover_enabled=\"off\" button_two_border_color__hover=\"null\" button_one_border_radius__hover_enabled=\"off\" button_one_border_radius__hover=\"null\" button_two_border_radius__hover_enabled=\"off\" button_two_border_radius__hover=\"null\" button_one_letter_spacing__hover_enabled=\"off\" button_one_letter_spacing__hover=\"null\" button_two_letter_spacing__hover_enabled=\"off\" button_two_letter_spacing__hover=\"null\" button_one_bg_color__hover_enabled=\"off\" button_one_bg_color__hover=\"null\" button_two_bg_color__hover_enabled=\"off\" button_two_bg_color__hover=\"null\"]\r\n
Plus de 390\u00a0000 nouveaux programmes malveillants sont enregistr\u00e9s chaque jour dans le monde. Cela repr\u00e9sente une moyenne de 270 nouvelles variantes de virus par minute.<\/p>\r\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section bb_built=\"1\" fullwidth=\"off\" specialty=\"off\" parallax_method=\"off\" module_id=\"scenarios\" module_class=\"cc-seccomp (2c)\" _builder_version=\"3.0.94\" custom_padding_tablet=\"50px|0|50px|0\" custom_padding_last_edited=\"on|desktop\" custom_css_main_element=\"padding: 70px 0 100px 0 !important;\" background_color=\"#ffffff\" prev_background_color=\"#eff1f5\" next_background_color=\"#eff1f5\" inner_width=\"auto\" inner_max_width=\"none\"][et_pb_row background_position=\"top_left\" background_repeat=\"repeat\" background_size=\"initial\" _builder_version=\"3.0.80\" custom_css_main_element=\"padding-top: 0 !important;\" width=\"80%\" max_width=\"1080px\"][et_pb_column type=\"4_4\"][et_pb_text admin_label=\"Weitere Szenarien\" background_layout=\"light\" text_orientation=\"center\" border_style=\"solid\" background_position=\"top_left\" background_repeat=\"repeat\" background_size=\"initial\" module_alignment=\"center\" _builder_version=\"3.0.80\"]\r\n