{"id":62821,"date":"2019-11-18T08:00:06","date_gmt":"2019-11-18T07:00:06","guid":{"rendered":"http:\/\/e3mag.com\/?p=62821"},"modified":"2024-01-19T14:49:43","modified_gmt":"2024-01-19T13:49:43","slug":"les-malwares-dans-la-boite-aux-lettres-cetait-hier","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/les-malwares-dans-la-boite-aux-lettres-cetait-hier\/","title":{"rendered":"Les logiciels malveillants dans la bo\u00eete aux lettres, c'est du pass\u00e9"},"content":{"rendered":"<p>Avec Advanced Threat Protection (ATP), Retarus a mis au point un package contre les attaques particuli\u00e8rement perfides par e-mail. Il contient entre autres le Sandboxing en collaboration avec le partenaire technologique Palo Alto Networks, la d\u00e9tection de fraude CxO contre la \"fraude du chef\" ainsi qu'une protection du temps de clic avec r\u00e9\u00e9criture d'URL.<\/p>\n<p>Si un malware devait malgr\u00e9 tout s'introduire dans les bo\u00eetes aux lettres des utilisateurs, la technologie Patient Zero Detection, d\u00e9velopp\u00e9e par Retarus et brevet\u00e9e dans toute l'Europe, est mise en \u0153uvre.<\/p>\n<p>Celle-ci peut identifier a posteriori les e-mails d\u00e9j\u00e0 distribu\u00e9s contenant des codes malveillants. Avec \"PZD Real-Time Response\", il est possible de d\u00e9finir des r\u00e9actions automatis\u00e9es pour Microsoft Exchange (on-premises ou Office 365).<\/p>\n<p>Si le syst\u00e8me de messagerie du client tombe compl\u00e8tement en panne, que ce soit \u00e0 cause d'un incident de s\u00e9curit\u00e9, d'une panne mat\u00e9rielle ou d'un temps d'arr\u00eat du cloud, Retarus Email Continuity met \u00e0 disposition des bo\u00eetes aux lettres webmail pr\u00e9-provisionn\u00e9es de mani\u00e8re transitoire. Si le client signale une panne, Retarus r\u00e9oriente le routage.<\/p>","protected":false},"excerpt":{"rendered":"<p>Les entreprises sont de plus en plus souvent confront\u00e9es \u00e0 des menaces complexes telles que le phishing ou l'ing\u00e9nierie sociale. Les m\u00e9canismes de s\u00e9curit\u00e9 traditionnels n'offrent plus une protection suffisante dans ce domaine.<\/p>","protected":false},"author":38,"featured_media":62822,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[161,2,36593],"tags":[39],"coauthors":[19920],"class_list":["post-62821","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-szene","category-sap-nachrichten","category-mag-1910","tag-cloud","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/10\/shutterstock_1200209341-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Unternehmen sind immer \u00f6fter mit komplexen Bedrohungen wie Phishing oder Social Engineering konfrontiert. Traditionelle Sicherheitsmechanismen bieten hier keinen ausreichenden Schutz mehr.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/categorie\/scene\/\" rel=\"category tag\">Szene<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/categorie\/sap-nouvelles\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/categorie\/mag-1910\/\" rel=\"category tag\">MAG 19-10<\/a>","author_info_v2":{"name":"Magazine E-3","url":"https:\/\/e3mag.com\/fr\/author\/e-3-magazin\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/62821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=62821"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/62821\/revisions"}],"predecessor-version":[{"id":137949,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/62821\/revisions\/137949"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/62822"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=62821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=62821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=62821"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=62821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}