{"id":945,"date":"2024-06-25T10:25:37","date_gmt":"2024-06-25T08:25:37","guid":{"rendered":"https:\/\/wd4u.fr\/?p=945"},"modified":"2024-06-25T10:27:51","modified_gmt":"2024-06-25T08:27:51","slug":"renforcez-votre-reseau-edge-vulnerable-contre-les-menaces-de-cybersecurite-avec-cyberscope-et-centre-pour-la-securite-internet-cis","status":"publish","type":"post","link":"https:\/\/wd4u.fr\/?p=945","title":{"rendered":"Renforcez votre r\u00e9seau Edge vuln\u00e9rable contre les menaces de cybers\u00e9curit\u00e9 avec CyberScope \u00aeet Centre pour la s\u00e9curit\u00e9 Internet \u00ae (CIS)"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/pages.netally.com\/rs\/125-ETP-460\/images\/CS-EM-SecurityFramework.png\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n<p>Le r\u00e9seau p\u00e9riph\u00e9rique constitue un domaine o\u00f9 les organisations de toutes tailles sont confront\u00e9es \u00e0 des d\u00e9fis croissants, tant du point de vue de la cybers\u00e9curit\u00e9 que du manque de visibilit\u00e9. Bien entendu, les failles de cybers\u00e9curit\u00e9 constituent une menace \u00e0 l\u2019\u00e9chelle de l\u2019entreprise, mais le p\u00e9rim\u00e8tre du r\u00e9seau est souvent z\u00e9ro pour de nombreux pirates informatiques, servant de point d\u2019entr\u00e9e dans l\u2019environnement.<br>Cela rend&nbsp;<a href=\"https:\/\/email.netally.com\/MTI1LUVUUC00NjAAAAGT7WGXZaXIYjx5Zp2wetlmDpyD6ULjyV5he_ga5WidCYLfLVXvIBRbjzZXGjGON4THR67RkcM=\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>l&rsquo;adoption d&rsquo;un cadre de s\u00e9curit\u00e9 tel que les contr\u00f4les de s\u00e9curit\u00e9 critiques CIS<\/strong><\/a>&nbsp;de plus en plus important pour toutes les organisations. Ces cadres sont essentiels pour de nombreuses raisons, notamment&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Normalisation<\/strong>&nbsp;des meilleures pratiques et lignes directrices<\/li>\n\n\n\n<li><strong>Identification, \u00e9valuation et gestion des risques<\/strong><\/li>\n\n\n\n<li><strong>Conformit\u00e9<\/strong>&nbsp;l\u00e9gale et r\u00e9glementaire<\/li>\n\n\n\n<li><strong>Posture de s\u00e9curit\u00e9<\/strong>&nbsp;am\u00e9lior\u00e9<\/li>\n\n\n\n<li><strong>Allocation optimale des ressources<\/strong>&nbsp;organisationnelles<\/li>\n\n\n\n<li><strong>Comparaison<\/strong>&nbsp;avec les meilleures pratiques de l&rsquo;industrie<\/li>\n<\/ul>\n\n\n\n<p>Il existe&nbsp;<strong>18 contr\u00f4les CIS avec des garanties associ\u00e9es<\/strong>&nbsp;.&nbsp;<a href=\"https:\/\/email.netally.com\/MTI1LUVUUC00NjAAAAGT7WGXZSwlr4SsS9TOJNSvINZGNcF1i13nhL01_A5JB5LfbrOU5rkADDTJkC8aydq4S4u5_H0=\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CyberScope<\/strong><\/a>&nbsp;s&rsquo;aligne sur six&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CIS Control 1 &#8211; Inventaire et contr\u00f4le des actifs de l&rsquo;entreprise<\/li>\n\n\n\n<li>CIS Control 4 &#8211; Configuration s\u00e9curis\u00e9e des actifs et logiciels de l&rsquo;entreprise<\/li>\n\n\n\n<li>CIS Control 7 &#8211; Gestion continue des vuln\u00e9rabilit\u00e9s<\/li>\n\n\n\n<li>CIS Control 12 &#8211; Gestion de l&rsquo;infrastructure r\u00e9seau<\/li>\n\n\n\n<li>CIS Control 13 &#8211; Surveillance et d\u00e9fense du r\u00e9seau<\/li>\n\n\n\n<li>Contr\u00f4le CIS 18 &#8211; Tests d&rsquo;intrusion<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/ci3.googleusercontent.com\/meips\/ADKq_NZovgGixBH0gVAoHhyzieL3fwJ4MMlb36S6gnK3CjrRJzxyzaHa2QM4PR5Tk1iUKKFnH-CNuq1B1p5wWcYYL2IH5CsHBmwAJ0STeuRIHqZPPwBjsvgzBT_jNxA-l6IOlQzHpw=s0-d-e1-ft#https:\/\/pages.netally.com\/rs\/125-ETP-460\/images\/EM-CIS-Controls.png?version=0\" alt=\"\" style=\"width:127px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p>La visibilit\u00e9 compl\u00e8te de CyberScope satisfait \u00e0 seize des garanties de ces contr\u00f4les.<\/p>\n\n\n\n<p>Pour en savoir plus, t\u00e9l\u00e9chargez notre&nbsp;<strong><a href=\"https:\/\/email.netally.com\/MTI1LUVUUC00NjAAAAGT7WGXZaXIYjx5Zp2wetlmDpyD6ULjyV5he_ga5WidCYLfLVXvIBRbjzZXGjGON4THR67RkcM=\" target=\"_blank\" rel=\"noreferrer noopener\">Note d&rsquo;Application&nbsp;.<\/a><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"nv-iframe-embed\"><iframe loading=\"lazy\" title=\"CyberScope\u00ae - Edge Network Vulnerability Scanner\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/6yHORlDgQWc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Le r\u00e9seau p\u00e9riph\u00e9rique constitue un domaine o\u00f9 les organisations de toutes tailles sont confront\u00e9es \u00e0 des d\u00e9fis croissants, tant du point de vue de la cybers\u00e9curit\u00e9 que du manque de visibilit\u00e9. Bien entendu, les failles de cybers\u00e9curit\u00e9 constituent une menace \u00e0 l\u2019\u00e9chelle de l\u2019entreprise, mais le p\u00e9rim\u00e8tre du r\u00e9seau est souvent z\u00e9ro pour de nombreux&hellip;&nbsp;<a href=\"https:\/\/wd4u.fr\/?p=945\" rel=\"bookmark\">Lire la suite &raquo;<span class=\"screen-reader-text\">Renforcez votre r\u00e9seau Edge vuln\u00e9rable contre les menaces de cybers\u00e9curit\u00e9 avec CyberScope \u00aeet Centre pour la s\u00e9curit\u00e9 Internet \u00ae (CIS)<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[7,8,1,5,9],"tags":[],"class_list":["post-945","post","type-post","status-publish","format-standard","hentry","category-cuivre-fibre-1g-10g-ethernet","category-cybersecurite","category-non-classe","category-wifi-6-6e","category-wi-fi-7"],"_links":{"self":[{"href":"https:\/\/wd4u.fr\/index.php?rest_route=\/wp\/v2\/posts\/945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wd4u.fr\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wd4u.fr\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wd4u.fr\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wd4u.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=945"}],"version-history":[{"count":2,"href":"https:\/\/wd4u.fr\/index.php?rest_route=\/wp\/v2\/posts\/945\/revisions"}],"predecessor-version":[{"id":948,"href":"https:\/\/wd4u.fr\/index.php?rest_route=\/wp\/v2\/posts\/945\/revisions\/948"}],"wp:attachment":[{"href":"https:\/\/wd4u.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wd4u.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wd4u.fr\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}