{"id":7282,"date":"2021-06-04T16:56:00","date_gmt":"2021-06-04T14:56:00","guid":{"rendered":"https:\/\/www.riviera-networks.com\/?p=7282"},"modified":"2021-08-30T11:39:46","modified_gmt":"2021-08-30T09:39:46","slug":"next-generation-endpoint-security","status":"publish","type":"post","link":"https:\/\/www.riviera-networks.com\/en\/next-generation-endpoint-security\/","title":{"rendered":"Next Generation Endpoint Security- derni\u00e8re approche en mati\u00e8re de cybers\u00e9curit\u00e9"},"content":{"rendered":"<p>R\u00e9cemment, <span class=\"has-inline-color has-header-gradient-color\"><\/span>de nombreuses entreprises ont d\u00fb permettre le travail \u00e0 distance, notamment en proposant du contenu en ligne, comme nous le savons tous. Mais ce changement s\u2019est produit si rapidement que cette transition n&rsquo;\u00e9tait pas parfaitement g\u00e9r\u00e9e. Une cons\u00e9quence directe de ces changements rapides est le manque de r\u00e8gles de cybers\u00e9curit\u00e9. Celles ci sont souvent inadapt\u00e9es ou tout simplement inexistantes. L\u2019approche classique de la cybers\u00e9curit\u00e9 consiste \u00e0 r\u00e9soudre les probl\u00e8mes possibles dans le p\u00e9rim\u00e8tre de l\u2019entreprise et \u00e0 faire confiance aux personnes \u00e0 l\u2019int\u00e9rieur de ce p\u00e9rim\u00e8tre. Toutefois, cela ne peut pas s\u2019appliquer lorsque la plupart des employ\u00e9s et des ressources r\u00e9seau se trouvent sur des sites distants. Le Next Generation Endpoint Security syst\u00e8me essaie d&rsquo;apporter les solutions \u00e0 ces probl\u00e8mes.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"375\" class=\"wp-image-7290\" style=\"width: 500px;\" src=\"https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/liam-tucker-cVMaxt672ss-unsplash-scaled.jpg?resize=500%2C375&#038;ssl=1\" alt=\"Endpoint Security\" srcset=\"https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/liam-tucker-cVMaxt672ss-unsplash-scaled.jpg?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/liam-tucker-cVMaxt672ss-unsplash-scaled.jpg?resize=300%2C225&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/liam-tucker-cVMaxt672ss-unsplash-scaled.jpg?resize=1024%2C769&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/liam-tucker-cVMaxt672ss-unsplash-scaled.jpg?resize=768%2C576&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/liam-tucker-cVMaxt672ss-unsplash-scaled.jpg?resize=1536%2C1153&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/liam-tucker-cVMaxt672ss-unsplash-scaled.jpg?resize=16%2C12&amp;ssl=1 16w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Le point de terminaison (endpoint &#8211; g\u00e9n\u00e9ralement ordinateurs, t\u00e9l\u00e9phones, etc) est un \u00e9l\u00e9ment essentiel de la conception de la s\u00e9curit\u00e9 de l\u2019entreprise visent ces appareils. Auparavant, beaucoup de ces attaques pouvaient \u00eatre trait\u00e9es au fur et \u00e0 mesure qu\u2019elles traversaient le p\u00e9rim\u00e8tre du r\u00e9seau de l\u2019entreprise. Mais comme ce n\u2019est plus le cas, nous devons envisager de s\u00e9curiser l&rsquo;endpoint comme une partie essentielle vuln\u00e9rable de l\u2019entreprise.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Certains principes doivent \u00eatre suivis pour une meilleure mise en \u0153uvre de la s\u00e9curit\u00e9 des terminaux de nouvelle g\u00e9n\u00e9ration dans le monde du travail:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Approche pr\u00e9ventive d\u2019abord :<\/strong> l\u2019organisation doit avoir une approche proactive et pr\u00e9ventive afin de minimiser l\u2019impact des attaques, dont le nombre est croissant, et de ne pas submerger les \u00e9quipes de s\u00e9curit\u00e9;<\/li><li><strong>Unifier pour r\u00e9duire le co\u00fbt total de possession :<\/strong> le d\u00e9ploiement de solutions distinctes d&rsquo;EPP,&nbsp;EDR, NGAV, VPN, etc cr\u00e9e un environnement complexe difficile et co\u00fbteux \u00e0 configurer et \u00e0 maintenir. Le d\u00e9ploiement d\u2019une solution de s\u00e9curit\u00e9 unifi\u00e9e est essentiel pour minimiser le co\u00fbt total de possession (TCO);<\/li><li><strong>Security<\/strong> unifi\u00e9e : La Next Gen Security&nbsp;se veut \u00eatre une architecture de s\u00e9curit\u00e9 unifi\u00e9e en terme de fonction et de gestion. C\u2019est le seul moyen d\u2019\u00e9viter de perdre du temps et des ressources pr\u00e9cieux en basculant entre les tableaux de bord des diff\u00e9rents syst\u00e8mes;<\/li><li><strong><a href=\"https:\/\/www.riviera-networks.com\/en\/solutions\/\">Bas\u00e9 sur le cloud <\/a>:<\/strong> la cybers\u00e9curit\u00e9 doit passer au cloud comme l\u2019ont fait la plupart des ressources des entreprises. Une&nbsp;solution de s\u00e9curit\u00e9 bas\u00e9e sur le cloud offre une protection des ressources cloud et tire parti de la flexibilit\u00e9 et de l\u2019\u00e9volutivit\u00e9 offerte par le cloud;<\/li><li><strong>S\u00e9curit\u00e9 bas\u00e9e<\/strong> sur l\u2019IA: L\u2019IA peut analyser et effectuer plusieurs t\u00e2ches en m\u00eame temps. Il peut acc\u00e9l\u00e9rer le processus d\u2019identification et de blocage des attaques et, en fin de compte, automatiser ce processus. De cette fa\u00e7on, l\u2019efficacit\u00e9 est maximis\u00e9e.   <ul><li> <img data-recalc-dims=\"1\" decoding=\"async\" width=\"300\" height=\"200\" class=\"wp-image-7288\" style=\"width: 300px;\" src=\"https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/fly-d-ZNOxwCEj5mw-unsplash-scaled.jpg?resize=300%2C200&#038;ssl=1\" alt=\"S\u00e9curit\u00e9 des terminaux de nouvelle g\u00e9n\u00e9ration\" srcset=\"https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/fly-d-ZNOxwCEj5mw-unsplash-scaled.jpg?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/fly-d-ZNOxwCEj5mw-unsplash-scaled.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/fly-d-ZNOxwCEj5mw-unsplash-scaled.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/fly-d-ZNOxwCEj5mw-unsplash-scaled.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/fly-d-ZNOxwCEj5mw-unsplash-scaled.jpg?resize=1536%2C1025&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/fly-d-ZNOxwCEj5mw-unsplash-scaled.jpg?resize=16%2C12&amp;ssl=1 16w, https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/fly-d-ZNOxwCEj5mw-unsplash-scaled.jpg?resize=360%2C240&amp;ssl=1 360w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/li><\/ul><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Qu\u2019est-ce que les solutions de s\u00e9curit\u00e9 des terminaux de nouvelle g\u00e9n\u00e9ration peuvent offrir \u00e0 votre entreprise<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Protection compl\u00e8te<\/strong> \u2013 &nbsp;L\u2019objectif des solutions endpoint security de nouvelle g\u00e9n\u00e9ration est de pr\u00e9venir tous les types d\u2019attaques, qu\u2019il s\u2019agit de logiciels malveillants connus et inconnus, qu\u2019il s\u2019agit de menaces quotidiennes ou d\u2019attaques plus sophistiqu\u00e9es et difficiles \u00e0 d\u00e9tecter. Les organisations modernes ont besoin de protections continues et proactives que les autres outils de s\u00e9curit\u00e9 ne peuvent pas fournir.<\/li><li><strong>Indicateur d\u2019approche d\u2019attaque<\/strong> &#8211; Les organisations doivent aller&nbsp;au-del\u00e0 d\u2019une approche r\u00e9active des indicateurs de compromission pour une strat\u00e9gie proactive de d\u00e9tection des attaques. Les outils de s\u00e9curit\u00e9 &nbsp;devraient plut\u00f4t se concentrer sur l\u2019identification des objectifs de l\u2019adversaire, &nbsp;pas seulement pour d\u00e9tecter les outils malveillants. La possibilit\u00e9 d\u2019identifier les&nbsp;attaques en cours peut aider \u00e0 pr\u00e9venir ou \u00e0 arr\u00eater une&nbsp;attaque&nbsp;avant une violation de donn\u00e9es d\u00e9vastatrice.<\/li><li><strong>Co\u00fbt et complexit\u00e9 r\u00e9duits<\/strong> \u2013 Les plates-formes de s\u00e9curit\u00e9 des endpoint&nbsp;doivent \u00eatre livr\u00e9es \u00e0 100 % dans le cloud afin de r\u00e9duire les co\u00fbts d&rsquo;infrastructure. De telles plates-formes&nbsp;permettent un d\u00e9ploiement sans effort d&rsquo;antivirus sur des centaines de milliers d&rsquo;endpoint en quelques minutes. La diffusion cloud&nbsp;offre une protection l\u00e0 o\u00f9 se trouvent vos utilisateurs , qu&rsquo;ils soient dedans ou en dehors de votre r\u00e9seau. Les solutions de s\u00e9curit\u00e9 au niveau de l&rsquo;endpoint, fournies par le cloud, offrent des avantages inestimables en termes de temps de d\u00e9ploiement, avec un minimum d&rsquo;actions avec les mises \u00e0 jour et la maintenance, ainsi que des capacit\u00e9s de protection imm\u00e9diate.<\/li><li><strong>Visibilit\u00e9 du point de terminaison <\/strong>\u2013 &nbsp;Une exigence cl\u00e9 est d\u2019avoir de la visibilit\u00e9 et de la surveillance continue sur chaque endpoint de&nbsp;l\u2019environnement.&nbsp;Cette fonctionnalit\u00e9 vous permet de d\u00e9couvrir et d\u2019examiner l\u2019activit\u00e9 actuelle et&nbsp;pr\u00e9c\u00e9dente d&rsquo;un appareil en quelques secondes,&nbsp;ce qui vous offre un historique complet de ses activit\u00e9s. Le temps de r\u00e9ponse doit \u00eatre de l&rsquo;ordre de la milliseconde avec une actualisation sur quelques minutes ou quelques heures. Cette fonctionnalit\u00e9 doit couvrir toutes les principales plates-formes, y compris Windows, Linux et Mac.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">La prochaine \u00e9tape pour votre entreprise<\/h3>\n\n\n\n<p>Ces \u00e9l\u00e9ments essentiels deviennent vitaux pour une cybers\u00e9curit\u00e9 efficace. Cependant, les organisations sont pr\u00eates \u00e0 riposter et \u00e0 d\u00e9fendre leur data contre les cyberattaques avec la cat\u00e9gorie d\u2019outils <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/endpoint-security\/index.html\">Next-Generation Endpoint<\/a> security.<\/p>\n\n\n\n<p>Si vous avez besoin de plus d\u2019informations sur les outils de s\u00e9curit\u00e9 des terminaux de nouvelle g\u00e9n\u00e9ration, n\u2019h\u00e9sitez pas \u00e0 nous contacter \u00e0 contact@riviera-networks.com&nbsp;et nous serons heureux de vous aider avec les meilleures solutions pour les besoins de votre entreprise.<\/p>\n\n\n\n<p>Source d\u2019information : checkpoint.com, comparethecloud.net<\/p>","protected":false},"excerpt":{"rendered":"<p>R\u00e9cemment, de nombreuses entreprises ont d\u00fb permettre le travail \u00e0 distance, notamment en proposant du contenu en ligne, comme nous le savons tous. Mais ce changement s\u2019est produit si rapidement que cette transition n&rsquo;\u00e9tait pas parfaitement g\u00e9r\u00e9e. Une cons\u00e9quence directe de ces changements rapides est le manque de r\u00e8gles de [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20,21],"tags":[],"class_list":["post-7282","post","type-post","status-publish","format-standard","hentry","category-products-technologies","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Next Generation Endpoint Security Riviera Networks Inc<\/title>\n<meta name=\"description\" content=\"La s\u00e9curit\u00e9 des terminaux de nouvelle g\u00e9n\u00e9ration essaie d&#039;apporter des solutions aux probl\u00e8mes de s\u00e9curit\u00e9 du t\u00e9l\u00e9travail.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riviera-networks.com\/en\/next-generation-endpoint-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Next Generation Endpoint Security Riviera Networks Inc\" \/>\n<meta property=\"og:description\" content=\"La s\u00e9curit\u00e9 des terminaux de nouvelle g\u00e9n\u00e9ration essaie d&#039;apporter des solutions aux probl\u00e8mes de s\u00e9curit\u00e9 du t\u00e9l\u00e9travail.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riviera-networks.com\/en\/next-generation-endpoint-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Riviera Networks Inc\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-04T14:56:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-30T09:39:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/liam-tucker-cVMaxt672ss-unsplash-scaled.jpg\" \/>\n<meta name=\"author\" content=\"Corina\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RivieraNetwrks\" \/>\n<meta name=\"twitter:site\" content=\"@RivieraNetwrks\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Corina\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/next-generation-endpoint-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/next-generation-endpoint-security\\\/\"},\"author\":{\"name\":\"Corina\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#\\\/schema\\\/person\\\/e7fb36ca9697b5c756c0fa17db888d12\"},\"headline\":\"Next Generation Endpoint Security- derni\u00e8re approche en mati\u00e8re de cybers\u00e9curit\u00e9\",\"datePublished\":\"2021-06-04T14:56:00+00:00\",\"dateModified\":\"2021-08-30T09:39:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/next-generation-endpoint-security\\\/\"},\"wordCount\":1012,\"publisher\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/next-generation-endpoint-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.riviera-networks.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/liam-tucker-cVMaxt672ss-unsplash-scaled.jpg\",\"articleSection\":[\"Products - Technologies\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/next-generation-endpoint-security\\\/\",\"url\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/next-generation-endpoint-security\\\/\",\"name\":\"Next Generation Endpoint Security Riviera Networks Inc\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/next-generation-endpoint-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/next-generation-endpoint-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.riviera-networks.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/liam-tucker-cVMaxt672ss-unsplash-scaled.jpg\",\"datePublished\":\"2021-06-04T14:56:00+00:00\",\"dateModified\":\"2021-08-30T09:39:46+00:00\",\"description\":\"La s\u00e9curit\u00e9 des terminaux de nouvelle g\u00e9n\u00e9ration essaie d'apporter des solutions aux probl\u00e8mes de s\u00e9curit\u00e9 du t\u00e9l\u00e9travail.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/next-generation-endpoint-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/next-generation-endpoint-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/next-generation-endpoint-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.riviera-networks.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/liam-tucker-cVMaxt672ss-unsplash-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.riviera-networks.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/liam-tucker-cVMaxt672ss-unsplash-scaled.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/next-generation-endpoint-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Next Generation Endpoint Security- derni\u00e8re approche en mati\u00e8re de cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/\",\"name\":\"Riviera Networks Inc\",\"description\":\"Infrastructure Experts\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#organization\",\"name\":\"Riviera Networks Inc\",\"url\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.riviera-networks.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/rnilogo-white-bg1.png\",\"contentUrl\":\"https:\\\/\\\/www.riviera-networks.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/rnilogo-white-bg1.png\",\"width\":849,\"height\":299,\"caption\":\"Riviera Networks Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/RivieraNetwrks\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/riviera-networks\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#\\\/schema\\\/person\\\/e7fb36ca9697b5c756c0fa17db888d12\",\"name\":\"Corina\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f51511960974cab79d2a1f22d3fd2ec8b41e8cd26d449b7dfb7389f4cce214?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f51511960974cab79d2a1f22d3fd2ec8b41e8cd26d449b7dfb7389f4cce214?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f51511960974cab79d2a1f22d3fd2ec8b41e8cd26d449b7dfb7389f4cce214?s=96&d=mm&r=g\",\"caption\":\"Corina\"},\"sameAs\":[\"http:\\\/\\\/www.riviera-networks.com\"],\"url\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/author\\\/cpreoteasa\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Next Generation Endpoint Security Riviera Networks Inc","description":"La s\u00e9curit\u00e9 des terminaux de nouvelle g\u00e9n\u00e9ration essaie d'apporter des solutions aux probl\u00e8mes de s\u00e9curit\u00e9 du t\u00e9l\u00e9travail.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riviera-networks.com\/en\/next-generation-endpoint-security\/","og_locale":"en_US","og_type":"article","og_title":"Next Generation Endpoint Security Riviera Networks Inc","og_description":"La s\u00e9curit\u00e9 des terminaux de nouvelle g\u00e9n\u00e9ration essaie d'apporter des solutions aux probl\u00e8mes de s\u00e9curit\u00e9 du t\u00e9l\u00e9travail.","og_url":"https:\/\/www.riviera-networks.com\/en\/next-generation-endpoint-security\/","og_site_name":"Riviera Networks Inc","article_published_time":"2021-06-04T14:56:00+00:00","article_modified_time":"2021-08-30T09:39:46+00:00","og_image":[{"url":"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/liam-tucker-cVMaxt672ss-unsplash-scaled.jpg","type":"","width":"","height":""}],"author":"Corina","twitter_card":"summary_large_image","twitter_creator":"@RivieraNetwrks","twitter_site":"@RivieraNetwrks","twitter_misc":{"Written by":"Corina","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riviera-networks.com\/en\/next-generation-endpoint-security\/#article","isPartOf":{"@id":"https:\/\/www.riviera-networks.com\/en\/next-generation-endpoint-security\/"},"author":{"name":"Corina","@id":"https:\/\/www.riviera-networks.com\/fr\/#\/schema\/person\/e7fb36ca9697b5c756c0fa17db888d12"},"headline":"Next Generation Endpoint Security- derni\u00e8re approche en mati\u00e8re de cybers\u00e9curit\u00e9","datePublished":"2021-06-04T14:56:00+00:00","dateModified":"2021-08-30T09:39:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riviera-networks.com\/en\/next-generation-endpoint-security\/"},"wordCount":1012,"publisher":{"@id":"https:\/\/www.riviera-networks.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.riviera-networks.com\/en\/next-generation-endpoint-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/liam-tucker-cVMaxt672ss-unsplash-scaled.jpg","articleSection":["Products - Technologies","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riviera-networks.com\/en\/next-generation-endpoint-security\/","url":"https:\/\/www.riviera-networks.com\/en\/next-generation-endpoint-security\/","name":"Next Generation Endpoint Security Riviera Networks Inc","isPartOf":{"@id":"https:\/\/www.riviera-networks.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riviera-networks.com\/en\/next-generation-endpoint-security\/#primaryimage"},"image":{"@id":"https:\/\/www.riviera-networks.com\/en\/next-generation-endpoint-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/liam-tucker-cVMaxt672ss-unsplash-scaled.jpg","datePublished":"2021-06-04T14:56:00+00:00","dateModified":"2021-08-30T09:39:46+00:00","description":"La s\u00e9curit\u00e9 des terminaux de nouvelle g\u00e9n\u00e9ration essaie d'apporter des solutions aux probl\u00e8mes de s\u00e9curit\u00e9 du t\u00e9l\u00e9travail.","breadcrumb":{"@id":"https:\/\/www.riviera-networks.com\/en\/next-generation-endpoint-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riviera-networks.com\/en\/next-generation-endpoint-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riviera-networks.com\/en\/next-generation-endpoint-security\/#primaryimage","url":"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/liam-tucker-cVMaxt672ss-unsplash-scaled.jpg","contentUrl":"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2021\/07\/liam-tucker-cVMaxt672ss-unsplash-scaled.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riviera-networks.com\/en\/next-generation-endpoint-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.riviera-networks.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Next Generation Endpoint Security- derni\u00e8re approche en mati\u00e8re de cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.riviera-networks.com\/fr\/#website","url":"https:\/\/www.riviera-networks.com\/fr\/","name":"Riviera Networks Inc","description":"Infrastructure Experts","publisher":{"@id":"https:\/\/www.riviera-networks.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riviera-networks.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riviera-networks.com\/fr\/#organization","name":"Riviera Networks Inc","url":"https:\/\/www.riviera-networks.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riviera-networks.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2020\/04\/rnilogo-white-bg1.png","contentUrl":"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2020\/04\/rnilogo-white-bg1.png","width":849,"height":299,"caption":"Riviera Networks Inc"},"image":{"@id":"https:\/\/www.riviera-networks.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/RivieraNetwrks","https:\/\/www.linkedin.com\/company\/riviera-networks\/"]},{"@type":"Person","@id":"https:\/\/www.riviera-networks.com\/fr\/#\/schema\/person\/e7fb36ca9697b5c756c0fa17db888d12","name":"Corina","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/84f51511960974cab79d2a1f22d3fd2ec8b41e8cd26d449b7dfb7389f4cce214?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/84f51511960974cab79d2a1f22d3fd2ec8b41e8cd26d449b7dfb7389f4cce214?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/84f51511960974cab79d2a1f22d3fd2ec8b41e8cd26d449b7dfb7389f4cce214?s=96&d=mm&r=g","caption":"Corina"},"sameAs":["http:\/\/www.riviera-networks.com"],"url":"https:\/\/www.riviera-networks.com\/en\/author\/cpreoteasa\/"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/posts\/7282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/comments?post=7282"}],"version-history":[{"count":14,"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/posts\/7282\/revisions"}],"predecessor-version":[{"id":7886,"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/posts\/7282\/revisions\/7886"}],"wp:attachment":[{"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/media?parent=7282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/categories?post=7282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riviera-networks.com\/en\/wp-json\/wp\/v2\/tags?post=7282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}