{"id":29299,"date":"2023-05-02T11:47:57","date_gmt":"2023-05-02T09:47:57","guid":{"rendered":"https:\/\/www.arc-data-shield.fr\/?p=29299"},"modified":"2024-07-02T09:45:25","modified_gmt":"2024-07-02T07:45:25","slug":"quand-les-meilleures-solutions-logicielles-comme-ledr-de-microsoft-se-fait-contourner-cela-demontre-que-notre-solution-hardware-est-la-bonne-reponse","status":"publish","type":"post","link":"https:\/\/www.arc-data-shield.fr\/en\/quand-les-meilleures-solutions-logicielles-comme-ledr-de-microsoft-se-fait-contourner-cela-demontre-que-notre-solution-hardware-est-la-bonne-reponse\/","title":{"rendered":"When the best EDR software solutions like Microsoft's can be bypassed, it shows that a hardware solution is the right answer to protect critical assets."},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.16&Prime; background_enable_image=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.16&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb width=\u00a0\u00bb95.8%\u00a0\u00bb inline_fonts=\u00a0\u00bbABeeZee\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: medium;\"><span style=\"font-size: large;\"><span style=\"color: #666666; font-family: inherit; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; display: inline !important; float: none;\">\u00a0\u00bb Les outils de cybers\u00e9curit\u00e9 s\u2019appuyant sur la technologie de Endpoint Detection and Response repr\u00e9sentaient jusqu\u2019\u00e0 maintenant la garantie d\u2019\u00eatre prot\u00e9g\u00e9 d\u2019attaques informatiques. Malheureusement, les hackeurs trouvent maintenant des moyens pour la contourner.<\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: inherit; font-size: medium;\"><\/span><\/p>\n<blockquote>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"font-family: inherit; font-weight: normal;\">La semaine derni\u00e8re, c\u2019\u00e9tait les experts de l\u2019agence gouvernementale britannique en charge de la cybers\u00e9curit\u00e9 qui tiraient la sonnette d&rsquo;alarme, en d\u00e9clarant que la prolif\u00e9ration des outils de piratage est hors de contr\u00f4le. L\u2019actualit\u00e9 leur donne raison, car c\u2019est l\u2019un des meilleurs outil de cybers\u00e9curit\u00e9 sur le march\u00e9 propos\u00e9 par Microsoft qui se voit progressivement contourner par des hackeurs.<\/span><span style=\"font-family: inherit; font-weight: normal;\">Appel\u00e9e <em>Endpoint Detection and Response<\/em> (EDR), litt\u00e9ralement d\u00e9tection et r\u00e9ponse des points finaux dans la langue de Moli\u00e8re, cette technologie est utilis\u00e9e dans des outils de cybers\u00e9curit\u00e9 hautement performants. Con\u00e7us pour rep\u00e9rer les premiers signes d\u2019activit\u00e9 malveillante sur toutes les machines qui servent de points finaux (comme les ordinateurs) d\u2019un r\u00e9seau informatique, ils permettent ensuite de bloquer les menaces avant m\u00eame que les intrus ne puissent voler des donn\u00e9es ou verrouiller les machines. <\/span><\/span><span style=\"font-size: medium;\"><span style=\"font-family: inherit; font-weight: normal;\">&#8230;\u00a0\u00bb<br \/><\/span><\/span><\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.tomsguide.fr\/des-hackeurs-ont-trouve-un-moyen-de-contourner-la-meilleure-technologie-de-cybersecurite-actuelle\/\">https:\/\/www.tomsguide.fr\/des-hackeurs-ont-trouve-un-moyen-de-contourner-la-meilleure-technologie-de-cybersecurite-actuelle\/<\/a><\/p>\n<p>Cr\u00e9dit : <a href=\"https:\/\/www.tomsguide.fr\/des-hackeurs-ont-trouve-un-moyen-de-contourner-la-meilleure-technologie-de-cybersecurite-actuelle\/\">Antoine BARSACQ &#8211; TOM&rsquo;S GUIDE<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0\u00bb Les outils de cybers\u00e9curit\u00e9 s\u2019appuyant sur la technologie de Endpoint Detection and Response repr\u00e9sentaient jusqu\u2019\u00e0 maintenant la garantie d\u2019\u00eatre prot\u00e9g\u00e9 d\u2019attaques informatiques. Malheureusement, les hackeurs trouvent maintenant des moyens pour la contourner. La semaine derni\u00e8re, c\u2019\u00e9tait les experts de l\u2019agence gouvernementale britannique en charge de la cybers\u00e9curit\u00e9 qui tiraient la sonnette d&rsquo;alarme, en d\u00e9clarant [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":29304,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.\n\n<img class=\"aligncenter wp-image-28717 size-full\" src=\"https:\/\/arc-data-shield.fr\/wp-content\/uploads\/2017\/02\/article_1.jpg?_t=1488209924\" width=\"1400\" height=\"933\" \/>\n\nUt velit mauris, egestas sed, gravida nec, ornare ut, mi. Aenean ut orci vel massa suscipit pulvinar. Nulla sollicitudin. Fusce varius, ligula non tempus aliquam, nunc turpis ullamcorper nibh, in tempus sapien eros vitae ligula. Pellentesque rhoncus nunc et augue. Integer id felis. Curabitur aliquet pellentesque diam. Integer quis metus vitae elit lobortis egestas. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Morbi vel erat non mauris convallis vehicula. Nulla et sapien. Integer tortor tellus, aliquam faucibus, convallis id, congue eu, quam. Mauris ullamcorper felis vitae erat. Proin feugiat, augue non elementum posuere, metus purus iaculis lectus, et tristique ligula justo vitae magna.\n\n<img class=\"alignnone size-full wp-image-28719\" src=\"https:\/\/arc-data-shield.fr\/wp-content\/uploads\/2017\/02\/second_image.jpg\" alt=\"\" width=\"1400\" height=\"933\" \/>\n\nAliquam convallis sollicitudin purus. Praesent aliquam, enim at fermentum mollis, ligula massa adipiscing nisl, ac euismod nibh nisl eu lectus. Fusce vulputate sem at sapien. Vivamus leo. Aliquam euismod libero eu enim. Nulla nec felis sed leo placerat imperdiet. Aenean suscipit nulla in justo. Suspendisse cursus rutrum augue. Nulla tincidunt tincidunt mi. Curabitur iaculis, lorem vel rhoncus faucibus, felis magna fermentum augue, et ultricies lacus lorem varius purus. Curabitur eu amet.","_et_gb_content_width":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-29299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-commonnews"],"_links":{"self":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts\/29299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/comments?post=29299"}],"version-history":[{"count":8,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts\/29299\/revisions"}],"predecessor-version":[{"id":30198,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts\/29299\/revisions\/30198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/media\/29304"}],"wp:attachment":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/media?parent=29299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/categories?post=29299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/tags?post=29299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}