{"id":44202,"date":"2019-04-24T11:28:16","date_gmt":"2019-04-24T09:28:16","guid":{"rendered":"https:\/\/www.euris.com\/?page_id=44202"},"modified":"2019-12-02T15:45:35","modified_gmt":"2019-12-02T14:45:35","slug":"waf","status":"publish","type":"page","link":"https:\/\/www.euris.com\/fr\/cloud-sante-marketplace\/waf\/","title":{"rendered":"Cloud Sant\u00e9 WAF &#8211; Web Application Firewall"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_id=\u00a0\u00bbrow-1&Prime; css=\u00a0\u00bb.vc_custom_1570722464994{padding-top: 150px !important;padding-bottom: 130px !important;}\u00a0\u00bb][vc_column][vc_single_image image=\u00a0\u00bb44249&Prime; img_size=\u00a0\u00bblarge\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb css_animation=\u00a0\u00bbslideInUp\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_id=\u00a0\u00bbrow-2&Prime; css=\u00a0\u00bb.vc_custom_1570721747301{padding-top: 30px !important;padding-bottom: 30px !important;background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column][vc_column_text]<\/p>\n<h1 style=\"text-align: center;\"><span style=\"color: #ffffff;\"><span style=\"color: #333333;\">Prot\u00e8gez les sites Web contre les attaques gr\u00e2ce au module Web Application Firewall (WAF) haute performance et complet<\/span><br \/>\n<\/span><\/h1>\n<p>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69f4e26e213d01326 .gem-button svg {fill: #0099ff;}.thegem-button-69f4e26e213d01326 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-center thegem-button-69f4e26e213d01326    \"  ><a class=\"gem-button gem-button-size-medium gem-button-style-outline gem-button-text-weight-normal gem-button-border-2\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;border-color: #0099ff;color: #0099ff;\" onmouseleave=\"this.style.borderColor='#0099ff';this.style.backgroundColor='transparent';this.style.color='#0099ff';\" onmouseenter=\"this.style.backgroundColor='#0099ff';this.style.color='#ffffff';\" href=\"https:\/\/www.euris.com\/fr\/contact\/\" target=\"_self\">demandez un devis<\/a><\/div> [\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_id=\u00a0\u00bbrow-3&Prime; css=\u00a0\u00bb.vc_custom_1570721942129{padding-top: 50px !important;padding-bottom: 50px !important;}\u00a0\u00bb][vc_column][vc_row_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime;]<div class=\" gem-icon-with-title  gem-icon-with-title-icon-size-large\" ><div class=\"gem-icon-with-title-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-large  gem-icon-shape-square gem-simple-icon \"  style=\"opacity: 1;\"><div class=\"gem-icon-inner\" style=\"\"><span class=\"gem-icon-half-1\" style=\"color: #0099ff;\"><span class=\"back-angle\">&#xf432;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #0099ff;\"><span class=\"back-angle\">&#xf432;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-iconed-title\"><h3 style=\"color: #0099ff;\">PR\u00c9VENEZ LES FAILLES DE S\u00c9CURIT\u00c9<\/h3><\/div><\/div>[vc_column_text]Cloud Sant\u00e9 WAF fournit une protection robuste contre les menaces applicatives, y compris le Top Ten de l&rsquo;OWASP3 qui permet aux entreprises d&rsquo;\u00e9viter le vol et la d\u00e9gradation de donn\u00e9es.<br \/>\nInt\u00e9grant la s\u00e9curit\u00e9 des listes blanches et des listes noires ainsi que l&rsquo;apprentissage automatis\u00e9 des applications, le WAF peut localiser avec pr\u00e9cision les attaques. Gr\u00e2ce \u00e0 la possibilit\u00e9 de d\u00e9sinfecter les entr\u00e9es, le WAF peut rendre les attaques inoffensives sans perturber l&rsquo;acc\u00e8s des utilisateurs aux applications.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime;]<div class=\" gem-icon-with-title  gem-icon-with-title-icon-size-large\" ><div class=\"gem-icon-with-title-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-large  gem-icon-shape-square gem-simple-icon \"  style=\"opacity: 1;\"><div class=\"gem-icon-inner\" style=\"\"><span class=\"gem-icon-half-1\" style=\"color: #0099ff;\"><span class=\"back-angle\">&#xf435;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #0099ff;\"><span class=\"back-angle\">&#xf435;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-iconed-title\"><h3 style=\"color: #0099ff;\">PROT\u00c9GEZ VOS DONN\u00c9ES EN \u00c9VITANT LES FUITES DE DONN\u00c9ES<\/h3><\/div><\/div>[vc_column_text]Cloud Sant\u00e9 WAF peut inspecter le trafic sortant \u00e0 la recherche de donn\u00e9es sensibles comme les num\u00e9ros de carte de cr\u00e9dit et de s\u00e9curit\u00e9 sociale. Gr\u00e2ce aux masques PCRE (Perl Compatible Regular Expressions) faciles \u00e0 d\u00e9finir, les entreprises peuvent masquer les cha\u00eenes personnalis\u00e9es, telles que les mots obsc\u00e8nes, qui apparaissent dans les forums des sites Web.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=\u00a0\u00bb.vc_custom_1570722073883{margin-top: 60px !important;}\u00a0\u00bb][vc_column_inner width=\u00a0\u00bb1\/2&Prime;]<div class=\" gem-icon-with-title  gem-icon-with-title-icon-size-large\" ><div class=\"gem-icon-with-title-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-large  gem-icon-shape-square gem-simple-icon \"  style=\"opacity: 1;\"><div class=\"gem-icon-inner\" style=\"\"><span class=\"gem-icon-half-1\" style=\"color: #0099ff;\"><span class=\"back-angle\">&#xf438;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #0099ff;\"><span class=\"back-angle\">&#xf438;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-iconed-title\"><h3 style=\"color: #0099ff;\">Att\u00e9nuez les vuln\u00e9rabilit\u00e9s des applications<\/h3><\/div><\/div>[vc_column_text]Avec une protection pr\u00eate \u00e0 l&#8217;emploi contre les attaques Web comme l&rsquo;injection SQL et les scripts intersites, le WAF peut emp\u00eacher les pirates d&rsquo;exploiter les vuln\u00e9rabilit\u00e9s des sites Web. Les clients peuvent d\u00e9finir des r\u00e8gles de script aFleX personnalis\u00e9es pour patcher les vuln\u00e9rabilit\u00e9s restantes, garantissant ainsi que les applications sont \u00e0 l&rsquo;abri des abus.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime;]<div class=\" gem-icon-with-title  gem-icon-with-title-icon-size-large\" ><div class=\"gem-icon-with-title-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-large  gem-icon-shape-square gem-simple-icon \"  style=\"opacity: 1;\"><div class=\"gem-icon-inner\" style=\"\"><span class=\"gem-icon-half-1\" style=\"color: #0099ff;\"><span class=\"back-angle\">&#xf43b;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #0099ff;\"><span class=\"back-angle\">&#xf43b;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-iconed-title\"><h3 style=\"color: #0099ff;\">Prot\u00e9gez les sessions et les cookies<\/h3><\/div><\/div>[vc_column_text]En cryptant facultativement les cookies, le WAF peut prot\u00e9ger les applications contre les menaces telles que l&#8217;empoisonnement par les cookies, l&rsquo;injection de cookies et la rediffusion des sessions. Les administrateurs peuvent d\u00e9finir les cookies \u00e0 crypter, ce qui leur permet de limiter la protection aux cookies sensibles en lecture seule, comme les cookies de session.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=\u00a0\u00bb.vc_custom_1570722073883{margin-top: 60px !important;}\u00a0\u00bb][vc_column_inner width=\u00a0\u00bb1\/2&Prime;]<div class=\" gem-icon-with-title  gem-icon-with-title-icon-size-large\" ><div class=\"gem-icon-with-title-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-large  gem-icon-shape-square gem-simple-icon \"  style=\"opacity: 1;\"><div class=\"gem-icon-inner\" style=\"\"><span class=\"gem-icon-half-1\" style=\"color: #0099ff;\"><span class=\"back-angle\">&#xf43e;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #0099ff;\"><span class=\"back-angle\">&#xf43e;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-iconed-title\"><h3 style=\"color: #0099ff;\">Arr\u00eatez les attaques automatis\u00e9es et prot\u00e9gez vos application contre les attaques DDoS<\/h3><\/div><\/div>[vc_column_text]D\u00e9tectez les robots et les clients automatis\u00e9s en reconnaissant les agents bot connus. De plus, gr\u00e2ce \u00e0 la limitation du taux de requ\u00eates et aux politiques aFleX, bloquez les utilisateurs qui g\u00e9n\u00e8rent trop de requ\u00eates ou qui ne se comportent pas comme des clients Web standard. Bloquez les attaques automatis\u00e9es provenant d&rsquo;une r\u00e9gion sp\u00e9cifique \u00e0 l&rsquo;aide de la g\u00e9olocalisation IP.<\/p>\n<p>En stoppant les attaques DDoS (Distributed Denial of Service) r\u00e9seau et applicatives, les Appliances assurent un acc\u00e8s ininterrompu aux applications. Certains mod\u00e8les sont \u00e9quip\u00e9s de la technologie FTA (Flexible Traffic Accelerator) pour d\u00e9tecter et bloquer les attaques DDoS courantes.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime;]<div class=\" gem-icon-with-title  gem-icon-with-title-icon-size-large\" ><div class=\"gem-icon-with-title-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-large  gem-icon-shape-square gem-simple-icon \"  style=\"opacity: 1;\"><div class=\"gem-icon-inner\" style=\"\"><span class=\"gem-icon-half-1\" style=\"color: #0099ff;\"><span class=\"back-angle\">&#xf441;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #0099ff;\"><span class=\"back-angle\">&#xf441;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-iconed-title\"><h3 style=\"color: #0099ff;\">MASQUEZ LES INFORMATIONS DU SERVEUR ET EMP\u00caCHEZ LES MOTEURS DE RECHERCHE D\u2019INDEXER DES DONN\u00c9ES SENSIBLES<\/h3><\/div><\/div>[vc_column_text]La solution normalise chaque requ\u00eate Web avant de l&rsquo;inspecter, en s&rsquo;assurant que les attaquants ne peuvent pas contourner le pare-feu des applications Web par obscurcissement. Emp\u00eachez les attaques de d\u00e9bordement de tampon en fixant des seuils maximums accept\u00e9s pour certains aspects des requ\u00eates HTTP et en bloquant les requ\u00eates qui d\u00e9passent les limites configur\u00e9es.<\/p>\n<p>Bloquez les demandes de sections prot\u00e9g\u00e9es par mot de passe ou priv\u00e9es d&rsquo;un site Web prot\u00e9g\u00e9 provenant d&rsquo;adresses IP de moteurs de recherche ou d&rsquo;agents utilisateurs. Les administrateurs peuvent d\u00e9finir des strat\u00e9gies pour bloquer l&rsquo;acc\u00e8s \u00e0 des pages Web sp\u00e9cifiques ou pour bloquer des agents utilisateurs sp\u00e9cifiques \u00e0 partir de l&rsquo;interface utilisateur Web de l\u2019Appliance.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css=\u00a0\u00bb.vc_custom_1570722547961{padding-bottom: 50px !important;}\u00a0\u00bb][vc_column]<style type=\"text\/css\">.thegem-button-69f4e26e218282109 .gem-button svg {fill: #0099ff;}.thegem-button-69f4e26e218282109 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-center thegem-button-69f4e26e218282109    \"  ><a class=\"gem-button gem-button-size-large gem-button-style-outline gem-button-text-weight-normal gem-button-border-2\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;border-color: #0099ff;color: #0099ff;\" onmouseleave=\"this.style.borderColor='#0099ff';this.style.backgroundColor='transparent';this.style.color='#0099ff';\" onmouseenter=\"this.style.backgroundColor='#0099ff';this.style.color='#ffffff';\" href=\"https:\/\/www.euris.com\/fr\/contact\/\" target=\"_self\">demandez un devis<\/a><\/div> [\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1570721769868{margin-bottom: -5px !important;padding-top: 50px !important;padding-bottom: 50px !important;}\u00a0\u00bb el_id=\u00a0\u00bbrow-4&Prime;][vc_column width=\u00a0\u00bb1\/4&Prime;]<div class=\"centered-box\"><div class=\"gem-icon gem-icon-pack-elegant gem-icon-size-medium  gem-icon-shape-square gem-simple-icon \"  style=\"margin-top: 10px;margin-bottom: 10px;opacity: 1;\"><div class=\"gem-icon-inner\" style=\"\"><span class=\"gem-icon-half-1\" style=\"color: #ffffff;\"><span class=\"back-angle\">&#xe0de;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #ffffff;\"><span class=\"back-angle\">&#xe0de;<\/span><\/span><\/div><\/div><\/div>[vc_column_text]<\/p>\n<h3 style=\"text-align: center;\"><span style=\"color: #ffffff;\">INTERNATIONAL<\/span><\/h3>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">Gr\u00e2ce \u00e0 une infrastructure d\u2019h\u00e9bergement multi territoire, d\u00e9ployez vos projets dans le monde entier : Europe, Asie, Am\u00e9rique, Afrique<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;]<div class=\"centered-box\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-medium  gem-icon-shape-square gem-simple-icon \"  style=\"margin-top: 10px;margin-bottom: 10px;opacity: 1;\"><div class=\"gem-icon-inner\" style=\"\"><span class=\"gem-icon-half-1\" style=\"color: #ffffff;\"><span class=\"back-angle\">&#xf10a;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #ffffff;\"><span class=\"back-angle\">&#xf10a;<\/span><\/span><\/div><\/div><\/div>[vc_column_text]<\/p>\n<h3 style=\"text-align: center;\"><span style=\"color: #ffffff;\">support &amp; expertise<\/span><\/h3>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">B\u00e9n\u00e9ficiez d\u2019une \u00e9quipe d\u2019experts en projet IT sant\u00e9 depuis plus de 20 ans et d\u2019un chef de projet d\u00e9di\u00e9<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;]<div class=\"centered-box\"><div class=\"gem-icon gem-icon-pack-elegant gem-icon-size-medium  gem-icon-shape-square gem-simple-icon \"  style=\"margin-top: 10px;margin-bottom: 10px;opacity: 1;\"><div class=\"gem-icon-inner\" style=\"\"><span class=\"gem-icon-half-1\" style=\"color: #ffffff;\"><span class=\"back-angle\">&#x7e;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #ffffff;\"><span class=\"back-angle\">&#x7e;<\/span><\/span><\/div><\/div><\/div>[vc_column_text]<\/p>\n<h3 style=\"text-align: center;\"><span style=\"color: #ffffff;\">CERTIFICATION &amp; AGR\u00c9MENTS E-SANT\u00c9<\/span><\/h3>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">S\u00e9curit\u00e9 des donn\u00e9es &amp; conformit\u00e9 globale : UE (HDS &amp; ISO 27001, RGPD), US (HIPAA), Chine (CSL).<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;]<div class=\"centered-box\"><div class=\"gem-icon gem-icon-pack-elegant gem-icon-size-medium  gem-icon-shape-square gem-simple-icon \"  style=\"margin-top: 10px;margin-bottom: 10px;opacity: 1;\"><div class=\"gem-icon-inner\" style=\"\"><span class=\"gem-icon-half-1\" style=\"color: #ffffff;\"><span class=\"back-angle\">&#xe037;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #ffffff;\"><span class=\"back-angle\">&#xe037;<\/span><\/span><\/div><\/div><\/div>[vc_column_text]<\/p>\n<h3 style=\"text-align: center;\"><span style=\"color: #ffffff;\">richesse fonctionnelle<\/span><\/h3>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">Une infrastructure-as-a-Service apportant des solutions rentables, souples et fonctionnelles<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]JTNDc2NyaXB0JTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZzdGF0aWMubGFuZGJvdC5pbyUyRmxhbmRib3Qtd2lkZ2V0JTJGbGFuZGJvdC13aWRnZXQtMS4wLjAuanMlMjIlM0UlM0MlMkZzY3JpcHQlM0UlMEElM0NzY3JpcHQlM0UlMEElMjAlMjB2YXIlMjBteUxhbmRib3QlMjAlM0QlMjBuZXclMjBMYW5kYm90TGl2ZWNoYXQlMjglN0IlMEElMjAlMjAlMjAlMjBpbmRleCUzQSUyMCUyN2h0dHBzJTNBJTJGJTJGbGFuZGJvdC5pbyUyRnUlMkZILTMxNDgxNC1RUDlDTkpYNzdaNkI5RFZPJTJGaW5kZXguaHRtbCUyNyUyQyUwQSUyMCUyMCU3RCUyOSUzQiUwQSUzQyUyRnNjcmlwdCUzRSUzQ3NjcmlwdCUzRSUwQSUyMCUyMCUyRiUyRiUyMFNob3clMjBhJTIwcHJvYWN0aXZlJTIwbWVzc2FnZSUyMGFmdGVyJTIwMTUlMjBzZWNvbmRzJTBBJTIwJTIwc2V0VGltZW91dCUyOGZ1bmN0aW9uJTI4JTI5JTIwJTdCJTBBJTIwJTIwJTIwJTIwbXlMYW5kYm90LnNlbmRQcm9hY3RpdmUlMjglN0IlMEElMjAlMjAlMjJtZXNzYWdlJTIyJTNBJTIwJTIyQm9uam91ciUyQyUyMHZvdXMlMjAlQzMlQUF0ZXMlMjBpbnQlQzMlQTlyZXNzJUMzJUE5cyUyMHBhciUyMGxlcyUyMHNvbHV0aW9ucyUyMENsb3VkJTIwU2FudCVDMyVBOSUyMCUzRiUyMiUyQyUwQSUyMCUyMCUyMmF1dGhvciUyMiUzQSUyMCUyMkV1cmlzJTIyJTJDJTBBJTIwJTIwJTIyYXZhdGFyJTIyJTNBJTIwJTIyaHR0cHMlM0ElMkYlMkZzdG9yYWdlLmdvb2dsZWFwaXMuY29tJTJGbWVkaWEuaGVsbG91bWkuY29tJTJGNTk4NDQlMkZjaGFubmVscyUyRk5WUTI0WjROQThaQU9FTDBDSDNBVThaU0Q2SjFFWExKLnBuZyUyMiUyQyUwQSUyMCUyMCUyMmV4dHJhJTIyJTNBJTIwJTdCJTBBJTIwJTIwJTIwJTIwJTIyaGlkZV90ZXh0Ym94JTIyJTNBJTIwdHJ1ZSUwQSUyMCUyMCU3RCUwQSU3RCUyOSUzQiUwQSUyMCUyMCU3RCUyQyUyMDE1MDAwJTI5JTNCJTBBJTNDJTJGc2NyaXB0JTNF[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_id=\u00a0\u00bbrow-1&Prime; css=\u00a0\u00bb.vc_custom_1570722464994{padding-top: 150px !important;padding-bottom: 130px !important;}\u00a0\u00bb][vc_column][vc_single_image image=\u00a0\u00bb44249&Prime; img_size=\u00a0\u00bblarge\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb css_animation=\u00a0\u00bbslideInUp\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_id=\u00a0\u00bbrow-2&Prime; css=\u00a0\u00bb.vc_custom_1570721747301{padding-top: 30px !important;padding-bottom: 30px !important;background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column][vc_column_text] Prot\u00e8gez les sites Web contre les attaques gr\u00e2ce au module Web Application Firewall (WAF) haute performance et complet [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_id=\u00a0\u00bbrow-3&Prime; css=\u00a0\u00bb.vc_custom_1570721942129{padding-top: 50px !important;padding-bottom: 50px !important;}\u00a0\u00bb][vc_column][vc_row_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime;][vc_column_text]Cloud Sant\u00e9 WAF fournit une protection robuste contre les menaces applicatives, y compris le Top Ten de l&rsquo;OWASP3 qui permet aux entreprises d&rsquo;\u00e9viter le vol et la d\u00e9gradation de donn\u00e9es. Int\u00e9grant la s\u00e9curit\u00e9 des listes blanches et des listes noires ainsi que l&rsquo;apprentissage automatis\u00e9 des applications, le WAF peut localiser avec pr\u00e9cision les attaques. Gr\u00e2ce \u00e0 la possibilit\u00e9 de d\u00e9sinfecter les entr\u00e9es, le WAF peut rendre les attaques inoffensives sans perturber&#8230;<\/p>\n","protected":false},"author":13,"featured_media":44259,"parent":30737,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-44202","page","type-page","status-publish","has-post-thumbnail"],"_links":{"self":[{"href":"https:\/\/www.euris.com\/fr\/wp-json\/wp\/v2\/pages\/44202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.euris.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.euris.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.euris.com\/fr\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euris.com\/fr\/wp-json\/wp\/v2\/comments?post=44202"}],"version-history":[{"count":3,"href":"https:\/\/www.euris.com\/fr\/wp-json\/wp\/v2\/pages\/44202\/revisions"}],"predecessor-version":[{"id":57030,"href":"https:\/\/www.euris.com\/fr\/wp-json\/wp\/v2\/pages\/44202\/revisions\/57030"}],"up":[{"embeddable":true,"href":"https:\/\/www.euris.com\/fr\/wp-json\/wp\/v2\/pages\/30737"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.euris.com\/fr\/wp-json\/wp\/v2\/media\/44259"}],"wp:attachment":[{"href":"https:\/\/www.euris.com\/fr\/wp-json\/wp\/v2\/media?parent=44202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}