{"id":61682,"date":"2022-01-25T12:39:20","date_gmt":"2022-01-25T11:39:20","guid":{"rendered":"https:\/\/www.avanet.com\/shop\/sophos-xgs-136-protection-reseau\/"},"modified":"2024-05-06T21:18:14","modified_gmt":"2024-05-06T20:18:14","slug":"sophos-xgs-136-network-protection","status":"publish","type":"product","link":"https:\/\/www.avanet.com\/fr\/shop\/sophos-xgs-136-network-protection\/","title":{"rendered":"Sophos XGS 136 Network Protection"},"content":{"rendered":"<div data-block=\"hook:125618\" class=\"alignfull\"><article id=\"post-125618\" class=\"post-125618\"><div class=\"entry-content is-layout-constrained\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-250a2198 overflow-x-auto ava-card-spacer\">\n<div class=\"gb-container gb-container-a3fda94b\">\n<div class=\"gb-container gb-container-24d50cef\">\n\n<a class=\"gb-button gb-button-064f35e8 gb-button-text\" href=\"#product-description\">Description<\/a>\n\n\n\n<a class=\"gb-button gb-button-386ff994 gb-button-text\" href=\"#key-features\">Caract\u00e9ristiques principales<\/a>\n\n\n\n<a class=\"gb-button gb-button-12ea1b08 gb-button-text\" href=\"#avanet-services\">Services<\/a>\n\n\n\n<a class=\"gb-button gb-button-835ba3cb gb-button-text\" href=\"#info-materials\">Mat\u00e9riel d'information<\/a>\n\n\n\n<a class=\"gb-button gb-button-c3a076ad gb-button-text\" href=\"#trial-version\">Version d'essai<\/a>\n\n\n\n<a class=\"gb-button gb-button-3ea28030 gb-button-text\" href=\"#help-for-buying\">Aide \u00e0 l'achat<\/a>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-4e7a9294\" id=\"product-description\">\n\n<p class=\"gb-headline gb-headline-b05b19cc\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M4.5 2A1.5 1.5 0 003 3.5v13A1.5 1.5 0 004.5 18h11a1.5 1.5 0 001.5-1.5V7.621a1.5 1.5 0 00-.44-1.06l-4.12-4.122A1.5 1.5 0 0011.378 2H4.5zm2.25 8.5a.75.75 0 000 1.5h6.5a.75.75 0 000-1.5h-6.5zm0 3a.75.75 0 000 1.5h6.5a.75.75 0 000-1.5h-6.5z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Description<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-e7703a29 gb-headline-text\">En savoir plus sur <br><strong>Sophos<\/strong><strong> Network Protection<\/strong><\/h2>\n\n\n\n<p>La Sophos Firewall Network Protection license offre des fonctions de s\u00e9curit\u00e9 compl\u00e8tes pour prot\u00e9ger votre infrastructure informatique contre les cyber-menaces. Cette page pr\u00e9sente les principales fonctionnalit\u00e9s de la licence. <\/p>\n\n\n\n<p>La licence Network Protection est essentielle pour votre Sophos Firewall, car elle offre des fonctions de s\u00e9curit\u00e9 de premier ordre tout en optimisant les performances de votre r\u00e9seau.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-e478be39\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M10 4.5c1.215 0 2.417.055 3.604.162a.68.68 0 01.615.597c.124 1.038.208 2.088.25 3.15l-1.689-1.69a.75.75 0 00-1.06 1.061l2.999 3a.75.75 0 001.06 0l3.001-3a.75.75 0 10-1.06-1.06l-1.748 1.747a41.31 41.31 0 00-.264-3.386 2.18 2.18 0 00-1.97-1.913 41.512 41.512 0 00-7.477 0 2.18 2.18 0 00-1.969 1.913 41.16 41.16 0 00-.16 1.61.75.75 0 101.495.12c.041-.52.093-1.038.154-1.552a.68.68 0 01.615-.597A40.012 40.012 0 0110 4.5zM5.281 9.22a.75.75 0 00-1.06 0l-3.001 3a.75.75 0 101.06 1.06l1.748-1.747c.042 1.141.13 2.27.264 3.386a2.18 2.18 0 001.97 1.913 41.533 41.533 0 007.477 0 2.18 2.18 0 001.969-1.913c.064-.534.117-1.071.16-1.61a.75.75 0 10-1.495-.12c-.041.52-.093 1.037-.154 1.552a.68.68 0 01-.615.597 40.013 40.013 0 01-7.208 0 .68.68 0 01-.615-.597 39.785 39.785 0 01-.25-3.15l1.689 1.69a.75.75 0 001.06-1.061l-2.999-3z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><strong>Synchronized Security<\/strong> et <strong>Security Heartbeat<\/strong> sont des fonctions de Sophos Firewall avec Network Protection qui permettent une communication transparente entre les produits de s\u00e9curit\u00e9 Sophos.\nCes fonctions am\u00e9liorent la d\u00e9tection et la r\u00e9ponse aux menaces en partageant des informations sur l'\u00e9tat de s\u00e9curit\u00e9 des syst\u00e8mes d'extr\u00e9mit\u00e9 et des p\u00e9riph\u00e9riques r\u00e9seau. <\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-68f6ba59\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M9 3.5a5.5 5.5 0 100 11 5.5 5.5 0 000-11zM2 9a7 7 0 1112.452 4.391l3.328 3.329a.75.75 0 11-1.06 1.06l-3.329-3.328A7 7 0 012 9z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><strong>Xstream TLS Inspection<\/strong> permet \u00e0 Sophos Firewall de surveiller le trafic chiffr\u00e9 et de rechercher les menaces. Cela permet au pare-feu de d\u00e9tecter et de bloquer le contenu malveillant dans le trafic crypt\u00e9 sans compromettre la vie priv\u00e9e des utilisateurs.<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-74b072ac\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path d=\"M13 4.5a2.5 2.5 0 11.702 1.737L6.97 9.604a2.518 2.518 0 010 .792l6.733 3.367a2.5 2.5 0 11-.671 1.341l-6.733-3.367a2.5 2.5 0 110-3.475l6.733-3.366A2.52 2.52 0 0113 4.5z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><strong>SD-WAN<\/strong> (Software-Defined Wide Area Network) est une fonctionnalit\u00e9 de Sophos Firewall avec Network Protection, qui permet un contr\u00f4le et une optimisation centralis\u00e9s des connexions r\u00e9seau sur plusieurs sites. Le SD-WAN am\u00e9liore les performances du r\u00e9seau, augmente la r\u00e9silience et r\u00e9duit les co\u00fbts des connexions MPLS traditionnelles.<\/span><\/p>\n\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-9100d5f2\" id=\"key-features\">\n\n<p class=\"gb-headline gb-headline-d83a70d9\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path d=\"M15.98 1.804a1 1 0 00-1.96 0l-.24 1.192a1 1 0 01-.784.785l-1.192.238a1 1 0 000 1.962l1.192.238a1 1 0 01.785.785l.238 1.192a1 1 0 001.962 0l.238-1.192a1 1 0 01.785-.785l1.192-.238a1 1 0 000-1.962l-1.192-.238a1 1 0 01-.785-.785l-.238-1.192zM6.949 5.684a1 1 0 00-1.898 0l-.683 2.051a1 1 0 01-.633.633l-2.051.683a1 1 0 000 1.898l2.051.684a1 1 0 01.633.632l.683 2.051a1 1 0 001.898 0l.683-2.051a1 1 0 01.633-.633l2.051-.683a1 1 0 000-1.898l-2.051-.683a1 1 0 01-.633-.633L6.95 5.684zM13.949 13.684a1 1 0 00-1.898 0l-.184.551a1 1 0 01-.632.633l-.551.183a1 1 0 000 1.898l.551.183a1 1 0 01.633.633l.183.551a1 1 0 001.898 0l.184-.551a1 1 0 01.632-.633l.551-.183a1 1 0 000-1.898l-.551-.184a1 1 0 01-.633-.632l-.183-.551z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Caract\u00e9ristiques principales<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-118b4703 gb-headline-text\">Inspection approfondie des paquets<\/h2>\n\n\n\n<p>L'inspection approfondie des paquets (Deep Packet Inspection, DPI) permet une analyse approfondie du trafic de donn\u00e9es sur le r\u00e9seau. Contrairement \u00e0 l'inspection de paquets traditionnelle, qui se limite aux informations d'en-t\u00eate, le DPI analyse le contenu complet des paquets de donn\u00e9es, y compris la charge utile et les en-t\u00eates. Il est ainsi possible de d\u00e9tecter des activit\u00e9s suspectes, des logiciels malveillants et d'autres menaces.  <\/p>\n\n\n\n<p>L'inspection approfondie des paquets offre les avantages suivants :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>D\u00e9tection avanc\u00e9e : DPI permet de d\u00e9tecter un large \u00e9ventail de menaces susceptibles d'\u00eatre ignor\u00e9es par les m\u00e9thodes traditionnelles d'inspection des paquets. Il s'agit notamment des techniques d'attaque avanc\u00e9es, des logiciels malveillants et des fuites de donn\u00e9es. <\/li>\n\n\n\n<li>Protection contre les applications malveillantes : Gr\u00e2ce \u00e0 l'analyse d\u00e9taill\u00e9e du trafic, DPI peut identifier les applications et les scripts malveillants. Ceux-ci tentent de contourner les hypoth\u00e8ses de s\u00e9curit\u00e9 ou d'extraire des informations sensibles. <\/li>\n\n\n\n<li>Am\u00e9lioration de la s\u00e9curit\u00e9 du r\u00e9seau : la capacit\u00e9 \u00e0 d\u00e9tecter les menaces \u00e0 un niveau plus profond permet d'am\u00e9liorer la s\u00e9curit\u00e9 du r\u00e9seau et de r\u00e9duire les risques de cyberattaques et de pertes de donn\u00e9es.<\/li>\n\n\n\n<li>Politiques de s\u00e9curit\u00e9 personnalisables : Les administrateurs informatiques peuvent cr\u00e9er et configurer des politiques DPI personnalis\u00e9es afin d'adapter la protection aux besoins sp\u00e9cifiques de leur organisation. Des hypoth\u00e8ses de s\u00e9curit\u00e9 cibl\u00e9es peuvent ainsi \u00eatre mises en \u0153uvre pour des applications ou des types de trafic sp\u00e9cifiques. <\/li>\n\n\n\n<li>Surveillance des performances : Deep Packet Inspection permet \u00e9galement de surveiller les performances du r\u00e9seau et aide les administrateurs informatiques \u00e0 identifier et \u00e0 r\u00e9soudre les goulets d'\u00e9tranglement et les probl\u00e8mes de qualit\u00e9 de service.<\/li>\n<\/ul>\n\n\n\n<p>En impl\u00e9mentant Deep Packet Inspection dans votre Sophos Firewall, vous b\u00e9n\u00e9ficiez d'une d\u00e9tection avanc\u00e9e des menaces, d'une s\u00e9curit\u00e9 r\u00e9seau accrue et d'un meilleur contr\u00f4le de votre infrastructure informatique. L'analyse d\u00e9taill\u00e9e du trafic qu'offre DPI est un facteur essentiel pour contrer les cyber-attaques et prot\u00e9ger votre r\u00e9seau. <\/p>\n\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-383a592b\">\n\n<p class=\"gb-headline gb-headline-fc719c5f\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path d=\"M15.98 1.804a1 1 0 00-1.96 0l-.24 1.192a1 1 0 01-.784.785l-1.192.238a1 1 0 000 1.962l1.192.238a1 1 0 01.785.785l.238 1.192a1 1 0 001.962 0l.238-1.192a1 1 0 01.785-.785l1.192-.238a1 1 0 000-1.962l-1.192-.238a1 1 0 01-.785-.785l-.238-1.192zM6.949 5.684a1 1 0 00-1.898 0l-.683 2.051a1 1 0 01-.633.633l-2.051.683a1 1 0 000 1.898l2.051.684a1 1 0 01.633.632l.683 2.051a1 1 0 001.898 0l.683-2.051a1 1 0 01.633-.633l2.051-.683a1 1 0 000-1.898l-2.051-.683a1 1 0 01-.633-.633L6.95 5.684zM13.949 13.684a1 1 0 00-1.898 0l-.184.551a1 1 0 01-.632.633l-.551.183a1 1 0 000 1.898l.551.183a1 1 0 01.633.633l.183.551a1 1 0 001.898 0l.184-.551a1 1 0 01.632-.633l.551-.183a1 1 0 000-1.898l-.551-.184a1 1 0 01-.633-.632l-.183-.551z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Caract\u00e9ristiques principales<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-6bb1ebdd gb-headline-text\">Pr\u00e9vention des intrusions<\/h2>\n\n\n\n<p>La pr\u00e9vention des intrusions est une fonction importante de la Network Protection de Sophos Firewall. Elle d\u00e9tecte et bloque les tentatives d'intrusion et les cyber-attaques en temps r\u00e9el. Le syst\u00e8me de pr\u00e9vention des intrusions (IPS) scanne le trafic r\u00e9seau \u00e0 la recherche d'anomalies et d'activit\u00e9s suspectes afin de d\u00e9tecter les menaces \u00e0 un stade pr\u00e9coce et de lancer des contre-offensives. Des technologies avanc\u00e9es et des bases de donn\u00e9es de signatures r\u00e9guli\u00e8rement mises \u00e0 jour sont utilis\u00e9es \u00e0 cet effet.   <\/p>\n\n\n\n<p>Avantages de la pr\u00e9vention des intrusions :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Protection proactive : IPS offre une protection proactive contre les menaces connues et inconnues. Il d\u00e9tecte les activit\u00e9s suspectes et les tentatives d'exploitation sur le r\u00e9seau avant qu'elles ne puissent causer des dommages. <\/li>\n\n\n\n<li>D\u00e9tection compl\u00e8te : en combinant des m\u00e9thodes de d\u00e9tection bas\u00e9es sur les signatures, des m\u00e9thodes de d\u00e9tection bas\u00e9es sur les anomalies et l'analyse comportementale, l'IPS peut couvrir un grand nombre de vecteurs d'attaque.\nIl identifie aussi bien les menaces connues que les menaces \"zero-day\". <\/li>\n\n\n\n<li>R\u00e9agir de mani\u00e8re automatis\u00e9e : Lorsqu'une menace est d\u00e9tect\u00e9e, l'IPS prend automatiquement des mesures pour bloquer l'attaque et minimiser ses effets.\nIl s'agit notamment de bloquer le trafic, de couper les connexions ou d'appliquer des r\u00e8gles de quarantaine. <\/li>\n\n\n\n<li>Politiques personnalis\u00e9es : pour personnaliser la d\u00e9tection et la r\u00e9ponse \u00e0 des menaces et vecteurs d'attaque sp\u00e9cifiques pertinents pour leur r\u00e9seau et leur organisation, les administrateurs informatiques peuvent cr\u00e9er des politiques IPS personnalis\u00e9es.<\/li>\n\n\n\n<li>Reporting int\u00e9gr\u00e9 : Intrusion Prevention offre des fonctions de reporting compl\u00e8tes.\nCela permet aux administrateurs informatiques d'\u00e9valuer l'efficacit\u00e9 de leurs mesures de s\u00e9curit\u00e9 et d'am\u00e9liorer continuellement leur strat\u00e9gie de s\u00e9curit\u00e9. <\/li>\n<\/ul>\n\n\n\n<p>Avec la pr\u00e9vention des intrusions dans votre Network Protection Sophos Firewall, vous b\u00e9n\u00e9ficiez d'une protection proactive et compl\u00e8te contre les cybermenaces.\nVous am\u00e9liorez ainsi la s\u00e9curit\u00e9 de votre r\u00e9seau et minimisez les risques de perte de donn\u00e9es et d'interruption d'activit\u00e9. <\/p>\n\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-f15ccf37\">\n\n<p class=\"gb-headline gb-headline-664b5acd\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path d=\"M15.98 1.804a1 1 0 00-1.96 0l-.24 1.192a1 1 0 01-.784.785l-1.192.238a1 1 0 000 1.962l1.192.238a1 1 0 01.785.785l.238 1.192a1 1 0 001.962 0l.238-1.192a1 1 0 01.785-.785l1.192-.238a1 1 0 000-1.962l-1.192-.238a1 1 0 01-.785-.785l-.238-1.192zM6.949 5.684a1 1 0 00-1.898 0l-.683 2.051a1 1 0 01-.633.633l-2.051.683a1 1 0 000 1.898l2.051.684a1 1 0 01.633.632l.683 2.051a1 1 0 001.898 0l.683-2.051a1 1 0 01.633-.633l2.051-.683a1 1 0 000-1.898l-2.051-.683a1 1 0 01-.633-.633L6.95 5.684zM13.949 13.684a1 1 0 00-1.898 0l-.184.551a1 1 0 01-.632.633l-.551.183a1 1 0 000 1.898l.551.183a1 1 0 01.633.633l.183.551a1 1 0 001.898 0l.184-.551a1 1 0 01.632-.633l.551-.183a1 1 0 000-1.898l-.551-.184a1 1 0 01-.633-.632l-.183-.551z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Caract\u00e9ristiques principales<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-96a6f2ab gb-headline-text\">SD-RED VPN<\/h2>\n\n\n\n<p>Pour administrer les appliances Sophos RED et profiter de tout leur potentiel, la licence Sophos Network Protection est n\u00e9cessaire.\nRED est une solution innovante qui simplifie le d\u00e9ploiement et la gestion de connexions VPN s\u00e9curis\u00e9es entre diff\u00e9rents sites.\nEn utilisant les appliances RED, vous \u00eates en mesure d'assurer des communications fiables et s\u00e9curis\u00e9es au sein de votre r\u00e9seau d'entreprise sur plusieurs sites.  <\/p>\n\n\n\n<p>Il est tr\u00e8s facile de configurer une appliance RED.\nIl suffit de connecter l'appliance \u00e0 Internet.\nElle est automatiquement d\u00e9tect\u00e9e par votre Sophos Firewall g\u00e9r\u00e9 de mani\u00e8re centralis\u00e9e.\nVous pouvez ensuite configurer les connexions VPN et les politiques de s\u00e9curit\u00e9 souhait\u00e9es pour l'appliance.\nLes configurations manuelles fastidieuses ou les processus chronophages ne sont plus n\u00e9cessaires.    <\/p>\n\n\n\n<p>Avec RED, vous b\u00e9n\u00e9ficiez de connexions s\u00e9curis\u00e9es et crypt\u00e9es entre les sites distants ou les succursales.\nPour appliquer des politiques de s\u00e9curit\u00e9 uniformes, le trafic des sites distants peut \u00eatre surveill\u00e9 et filtr\u00e9 de mani\u00e8re centralis\u00e9e par votre Sophos Firewall.\nParall\u00e8lement, l'optimisation de la bande passante et de la latence permet d'am\u00e9liorer les performances et la stabilit\u00e9 du r\u00e9seau.  <\/p>\n\n\n\n<p>L'utilisation des appliances RED augmente la flexibilit\u00e9 et l'\u00e9volutivit\u00e9 de votre r\u00e9seau.\nSans grand effort, vous pouvez ajouter ou supprimer rapidement et facilement de nouveaux sites en cas de besoin. <\/p>\n\n\n\n<p>Avec la licence Network Protection, vous \u00eates donc en mesure de profiter pleinement des avantages des appliances RED et de g\u00e9rer votre r\u00e9seau de mani\u00e8re simple, efficace et s\u00e9curis\u00e9e.\nAvec cette licence, vous \u00eates parfaitement \u00e9quip\u00e9 pour relever les d\u00e9fis d'un monde de plus en plus interconnect\u00e9. <\/p>\n\n\n\n<p>Instructions : <a href=\"https:\/\/www.avanet.com\/fr\/kb\/configurer-sophos-red\/\" data-type=\"URL\" data-id=\"https:\/\/www.avanet.com\/kb\/sophos-red-einrichten\/\">ConfigurerSophos RED <\/a><\/p>\n\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-e8acc431\">\n\n<p class=\"gb-headline gb-headline-1b2986aa\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path d=\"M15.98 1.804a1 1 0 00-1.96 0l-.24 1.192a1 1 0 01-.784.785l-1.192.238a1 1 0 000 1.962l1.192.238a1 1 0 01.785.785l.238 1.192a1 1 0 001.962 0l.238-1.192a1 1 0 01.785-.785l1.192-.238a1 1 0 000-1.962l-1.192-.238a1 1 0 01-.785-.785l-.238-1.192zM6.949 5.684a1 1 0 00-1.898 0l-.683 2.051a1 1 0 01-.633.633l-2.051.683a1 1 0 000 1.898l2.051.684a1 1 0 01.633.632l.683 2.051a1 1 0 001.898 0l.683-2.051a1 1 0 01.633-.633l2.051-.683a1 1 0 000-1.898l-2.051-.683a1 1 0 01-.633-.633L6.95 5.684zM13.949 13.684a1 1 0 00-1.898 0l-.184.551a1 1 0 01-.632.633l-.551.183a1 1 0 000 1.898l.551.183a1 1 0 01.633.633l.183.551a1 1 0 001.898 0l.184-.551a1 1 0 01.632-.633l.551-.183a1 1 0 000-1.898l-.551-.184a1 1 0 01-.633-.632l-.183-.551z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Caract\u00e9ristiques principales<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-ad82995f gb-headline-text\">Protection avanc\u00e9e contre les menaces<\/h2>\n\n\n\n<p>Advanced Threat Protection (ATP) est une puissante fonctionnalit\u00e9 de Sophos Firewall qui d\u00e9tecte, pr\u00e9vient et r\u00e9pond aux attaques avanc\u00e9es et cibl\u00e9es.\nATP utilise des technologies de pointe pour lutter efficacement contre les menaces complexes et persistantes. <\/p>\n\n\n\n<p>Les avantages de l'ATP comprennent<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>D\u00e9tection des attaques \"zero-day\" et des menaces inconnues gr\u00e2ce \u00e0 l'utilisation de l'apprentissage automatique, de l'analyse comportementale et des donn\u00e9es sur les menaces en temps r\u00e9el.<\/li>\n\n\n\n<li>D\u00e9fense proactive contre les menaces par la d\u00e9tection d'anomalies dans le comportement du r\u00e9seau et mesures pr\u00e9ventives bas\u00e9es sur ces anomalies.<\/li>\n\n\n\n<li>Protection contre les ransomwares et les attaques cibl\u00e9es, que les solutions de s\u00e9curit\u00e9 traditionnelles parviennent souvent \u00e0 contourner.<\/li>\n\n\n\n<li>Int\u00e9gration et collaboration avec d'autres produits de s\u00e9curit\u00e9 Sophos pour une protection compl\u00e8te et coordonn\u00e9e de l'infrastructure informatique.<\/li>\n\n\n\n<li>Automatiser les r\u00e9ponses aux menaces d\u00e9tect\u00e9es afin de minimiser l'impact des incidents de s\u00e9curit\u00e9 et de r\u00e9duire le temps de retour \u00e0 la normale.<\/li>\n<\/ul>\n\n\n\n<p>En impl\u00e9mentant l'ATP dans votre Sophos Firewall Network Protection , vous vous assurez que votre entreprise est prot\u00e9g\u00e9e contre les cybermenaces les plus r\u00e9centes et les plus sophistiqu\u00e9es, tout en b\u00e9n\u00e9ficiant des nombreux avantages de cette fonction de s\u00e9curit\u00e9 avanc\u00e9e.<\/p>\n\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-80fd4ec8\">\n\n<p class=\"gb-headline gb-headline-3e51a546\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path d=\"M15.98 1.804a1 1 0 00-1.96 0l-.24 1.192a1 1 0 01-.784.785l-1.192.238a1 1 0 000 1.962l1.192.238a1 1 0 01.785.785l.238 1.192a1 1 0 001.962 0l.238-1.192a1 1 0 01.785-.785l1.192-.238a1 1 0 000-1.962l-1.192-.238a1 1 0 01-.785-.785l-.238-1.192zM6.949 5.684a1 1 0 00-1.898 0l-.683 2.051a1 1 0 01-.633.633l-2.051.683a1 1 0 000 1.898l2.051.684a1 1 0 01.633.632l.683 2.051a1 1 0 001.898 0l.683-2.051a1 1 0 01.633-.633l2.051-.683a1 1 0 000-1.898l-2.051-.683a1 1 0 01-.633-.633L6.95 5.684zM13.949 13.684a1 1 0 00-1.898 0l-.184.551a1 1 0 01-.632.633l-.551.183a1 1 0 000 1.898l.551.183a1 1 0 01.633.633l.183.551a1 1 0 001.898 0l.184-.551a1 1 0 01.632-.633l.551-.183a1 1 0 000-1.898l-.551-.184a1 1 0 01-.633-.632l-.183-.551z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Caract\u00e9ristiques principales<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-369f9cea gb-headline-text\">Contr\u00f4le synchronis\u00e9 des applications<\/h2>\n\n\n\n<p>Synchronized Application Control am\u00e9liore la visibilit\u00e9 des applications sur le r\u00e9seau et les contr\u00f4le.\nIl permet aux administrateurs informatiques d'identifier et de g\u00e9rer efficacement le trafic des applications sur le r\u00e9seau. <\/p>\n\n\n\n<p>Les avantages du contr\u00f4le synchronis\u00e9 des applications comprennent<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Visibilit\u00e9 accrue : les administrateurs informatiques obtiennent des informations d\u00e9taill\u00e9es sur les applications qui s'ex\u00e9cutent sur le r\u00e9seau.\nCela inclut les applications utilis\u00e9es par les utilisateurs et les appareils, ainsi que l'utilisation de la bande passante. <\/li>\n\n\n\n<li>Contr\u00f4le granulaire fin : la possibilit\u00e9 de d\u00e9finir des politiques d'application au niveau de l'utilisateur, du groupe ou de l'appareil permet de contr\u00f4ler pr\u00e9cis\u00e9ment le trafic des applications et de garantir que les applications professionnelles importantes sont prioritaires.<\/li>\n\n\n\n<li>S\u00e9curit\u00e9 am\u00e9lior\u00e9e : les applications ind\u00e9sirables ou non s\u00fbres peuvent \u00eatre identifi\u00e9es et bloqu\u00e9es.\nCela permet de r\u00e9duire les risques de s\u00e9curit\u00e9 et d'am\u00e9liorer la protection contre les menaces telles que les logiciels malveillants et la perte de donn\u00e9es. <\/li>\n\n\n\n<li>Optimisation des ressources r\u00e9seau : Les administrateurs informatiques peuvent d\u00e9finir des limites de bande passante pour certaines applications. Cela permet de garantir que les applications commerciales importantes disposent de ressources suffisantes et d'optimiser les performances du r\u00e9seau.<\/li>\n<\/ul>\n\n\n\n<p>Avec le contr\u00f4le synchronis\u00e9 des applications dans votre Network Protection Sophos Firewall, vous b\u00e9n\u00e9ficiez d'une meilleure visibilit\u00e9 et d'un meilleur contr\u00f4le des applications sur le r\u00e9seau.\nCela se traduit par une s\u00e9curit\u00e9 accrue et une meilleure utilisation des ressources du r\u00e9seau. <\/p>\n\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-888caa02\">\n\n<p class=\"gb-headline gb-headline-b98ef906\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path d=\"M15.98 1.804a1 1 0 00-1.96 0l-.24 1.192a1 1 0 01-.784.785l-1.192.238a1 1 0 000 1.962l1.192.238a1 1 0 01.785.785l.238 1.192a1 1 0 001.962 0l.238-1.192a1 1 0 01.785-.785l1.192-.238a1 1 0 000-1.962l-1.192-.238a1 1 0 01-.785-.785l-.238-1.192zM6.949 5.684a1 1 0 00-1.898 0l-.683 2.051a1 1 0 01-.633.633l-2.051.683a1 1 0 000 1.898l2.051.684a1 1 0 01.633.632l.683 2.051a1 1 0 001.898 0l.683-2.051a1 1 0 01.633-.633l2.051-.683a1 1 0 000-1.898l-2.051-.683a1 1 0 01-.633-.633L6.95 5.684zM13.949 13.684a1 1 0 00-1.898 0l-.184.551a1 1 0 01-.632.633l-.551.183a1 1 0 000 1.898l.551.183a1 1 0 01.633.633l.183.551a1 1 0 001.898 0l.184-.551a1 1 0 01.632-.633l.551-.183a1 1 0 000-1.898l-.551-.184a1 1 0 01-.633-.632l-.183-.551z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Caract\u00e9ristiques principales<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-3abbf246 gb-headline-text\">Protection des mouvements lat\u00e9raux<\/h2>\n\n\n\n<p>La protection des mouvements lat\u00e9raux contribue \u00e0 am\u00e9liorer la s\u00e9curit\u00e9 du r\u00e9seau en emp\u00eachant la propagation des menaces au sein du r\u00e9seau.\nCette fonction d\u00e9tecte et bloque les mouvements lat\u00e9raux des logiciels malveillants et des attaquants qui tentent d'acc\u00e9der \u00e0 d'autres syst\u00e8mes du r\u00e9seau \u00e0 partir d'un syst\u00e8me infect\u00e9. <\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>La protection des mouvements lat\u00e9raux contribue \u00e0 emp\u00eacher les menaces de se propager sur le r\u00e9seau.\nCette fonction d\u00e9tecte et bloque les mouvements lat\u00e9raux des logiciels malveillants et des attaquants lorsqu'ils tentent d'acc\u00e9der \u00e0 d'autres syst\u00e8mes du r\u00e9seau \u00e0 partir d'un syst\u00e8me infect\u00e9. <\/p>\n\n\n\n<p>Les avantages de la protection contre les mouvements lat\u00e9raux sont notamment les suivants :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>S\u00e9curit\u00e9 accrue : la protection contre les mouvements lat\u00e9raux limite la propagation des menaces sur le r\u00e9seau.\nCela r\u00e9duit le risque que les attaques se propagent \u00e0 d'autres syst\u00e8mes et causent des dommages plus importants. <\/li>\n\n\n\n<li>D\u00e9tection rapide : Lateral Movement Protection d\u00e9tecte les activit\u00e9s suspectes qui indiquent des mouvements lat\u00e9raux.\nLes administrateurs informatiques peuvent ainsi r\u00e9agir rapidement aux menaces potentielles. <\/li>\n\n\n\n<li>R\u00e9action automatique : pour bloquer les mouvements lat\u00e9raux des menaces et minimiser l'impact des attaques, Lateral Movement Protection peut prendre automatiquement des contre-mesures.<\/li>\n\n\n\n<li>Int\u00e9gration avec d'autres fonctions de s\u00e9curit\u00e9 : Lateral Movement Protection fonctionne main dans la main avec d'autres fonctions de Sophos Firewall Network Protection.\nCela permet d'assurer une protection compl\u00e8te et coordonn\u00e9e de l'infrastructure informatique. <\/li>\n<\/ul>\n\n\n\n<p>La mise en \u0153uvre de la protection des mouvements lat\u00e9raux dans Sophos Firewall Network Protection renforce la s\u00e9curit\u00e9 du r\u00e9seau et emp\u00eache la propagation des menaces susceptibles de causer des dommages et des interruptions de service consid\u00e9rables.<\/p>\n\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-71dabbf5\">\n\n<p class=\"gb-headline gb-headline-7dbae87c\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path d=\"M15.98 1.804a1 1 0 00-1.96 0l-.24 1.192a1 1 0 01-.784.785l-1.192.238a1 1 0 000 1.962l1.192.238a1 1 0 01.785.785l.238 1.192a1 1 0 001.962 0l.238-1.192a1 1 0 01.785-.785l1.192-.238a1 1 0 000-1.962l-1.192-.238a1 1 0 01-.785-.785l-.238-1.192zM6.949 5.684a1 1 0 00-1.898 0l-.683 2.051a1 1 0 01-.633.633l-2.051.683a1 1 0 000 1.898l2.051.684a1 1 0 01.633.632l.683 2.051a1 1 0 001.898 0l.683-2.051a1 1 0 01.633-.633l2.051-.683a1 1 0 000-1.898l-2.051-.683a1 1 0 01-.633-.633L6.95 5.684zM13.949 13.684a1 1 0 00-1.898 0l-.184.551a1 1 0 01-.632.633l-.551.183a1 1 0 000 1.898l.551.183a1 1 0 01.633.633l.183.551a1 1 0 001.898 0l.184-.551a1 1 0 01.632-.633l.551-.183a1 1 0 000-1.898l-.551-.184a1 1 0 01-.633-.632l-.183-.551z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Caract\u00e9ristiques principales<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-6290cb9c gb-headline-text\">ID utilisateur synchronis\u00e9<\/h2>\n\n\n\n<p>Synchronized User ID offre une identification simplifi\u00e9e des utilisateurs et une int\u00e9gration transparente avec l'Active Directory existant.\nIl permet d'attribuer rapidement et pr\u00e9cis\u00e9ment les activit\u00e9s du r\u00e9seau \u00e0 des utilisateurs individuels.\nCela ne n\u00e9cessite aucune configuration manuelle compliqu\u00e9e ni aucun script.  <\/p>\n\n\n\n<p>Les avantages de l'ID utilisateur synchronis\u00e9 sont les suivants<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identification simplifi\u00e9e des utilisateurs : Synchronized User ID offre une int\u00e9gration transparente avec les services d'annuaire comme Active Directory.\nCela permet la reconnaissance automatique des identit\u00e9s d'utilisateurs sur le r\u00e9seau. <\/li>\n\n\n\n<li>S\u00e9curit\u00e9 renforc\u00e9e : en attribuant pr\u00e9cis\u00e9ment les activit\u00e9s r\u00e9seau aux utilisateurs, les administrateurs informatiques peuvent appliquer efficacement les politiques de s\u00e9curit\u00e9.\nCela permet de garantir que seuls les utilisateurs autoris\u00e9s ont acc\u00e8s aux ressources sensibles. <\/li>\n\n\n\n<li>Gain de temps: L'identification automatique des utilisateurs rend les configurations et les scripts manuels superflus. Les administrateurs informatiques gagnent du temps et peuvent se concentrer sur d'autres t\u00e2ches importantes. <\/li>\n\n\n\n<li>Contr\u00f4le granulaire : pour assurer un contr\u00f4le granulaire du r\u00e9seau, les administrateurs informatiques peuvent cr\u00e9er des politiques d'acc\u00e8s et des r\u00e8gles d'application sp\u00e9cifiques \u00e0 chaque utilisateur gr\u00e2ce \u00e0 Synchronized User ID.<\/li>\n<\/ul>\n\n\n\n<p>En impl\u00e9mentant Synchronized User ID dans Sophos Firewall Network Protection , vous b\u00e9n\u00e9ficiez d'une meilleure identification des utilisateurs, d'une s\u00e9curit\u00e9 accrue et d'une gestion plus efficace du r\u00e9seau.<\/p>\n\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-53b0d289\">\n\n<p class=\"gb-headline gb-headline-e73f4ec8\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path d=\"M15.98 1.804a1 1 0 00-1.96 0l-.24 1.192a1 1 0 01-.784.785l-1.192.238a1 1 0 000 1.962l1.192.238a1 1 0 01.785.785l.238 1.192a1 1 0 001.962 0l.238-1.192a1 1 0 01.785-.785l1.192-.238a1 1 0 000-1.962l-1.192-.238a1 1 0 01-.785-.785l-.238-1.192zM6.949 5.684a1 1 0 00-1.898 0l-.683 2.051a1 1 0 01-.633.633l-2.051.683a1 1 0 000 1.898l2.051.684a1 1 0 01.633.632l.683 2.051a1 1 0 001.898 0l.683-2.051a1 1 0 01.633-.633l2.051-.683a1 1 0 000-1.898l-2.051-.683a1 1 0 01-.633-.633L6.95 5.684zM13.949 13.684a1 1 0 00-1.898 0l-.184.551a1 1 0 01-.632.633l-.551.183a1 1 0 000 1.898l.551.183a1 1 0 01.633.633l.183.551a1 1 0 001.898 0l.184-.551a1 1 0 01.632-.633l.551-.183a1 1 0 000-1.898l-.551-.184a1 1 0 01-.633-.632l-.183-.551z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Caract\u00e9ristiques principales<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-22a9c6ec gb-headline-text\">Rapports<\/h2>\n\n\n\n<p>Sophos Firewall Reporting fournit aux administrateurs informatiques et aux ing\u00e9nieurs de s\u00e9curit\u00e9 des informations pr\u00e9cieuses sur l'activit\u00e9 du r\u00e9seau et les \u00e9v\u00e9nements de s\u00e9curit\u00e9. Le stockage des logs dans Sophos Central permet d'acc\u00e9der rapidement et efficacement aux informations importantes et de les analyser. Avec le stockage standard, les logs peuvent \u00eatre stock\u00e9s gratuitement dans Sophos Central pendant 7 jours.  <\/p>\n\n\n\n<p>Les fonctions de reporting offrent plusieurs avantages :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Visualisation du trafic et de l'activit\u00e9 du r\u00e9seau en temps r\u00e9el afin d'identifier rapidement les comportements inhabituels et les menaces potentielles.<\/li>\n\n\n\n<li>Informations d\u00e9taill\u00e9es sur les applications, les utilisateurs et les appareils qui g\u00e9n\u00e8rent le trafic r\u00e9seau, afin de pouvoir prendre des d\u00e9cisions \u00e9clair\u00e9es sur les politiques de s\u00e9curit\u00e9 et l'affectation des ressources.<\/li>\n\n\n\n<li>Rapports automatis\u00e9s permettant de respecter les exigences de conformit\u00e9 et d'identifier les vuln\u00e9rabilit\u00e9s ou les risques sur le r\u00e9seau.<\/li>\n\n\n\n<li>R\u00e9action rapide aux incidents de s\u00e9curit\u00e9 gr\u00e2ce \u00e0 des alertes et des notifications d\u00e9finies par l'utilisateur.<\/li>\n<\/ul>\n\n\n\n<p>Avec la Central Orchestration, la limite de stockage est port\u00e9e \u00e0 30 jours, ce qui permet de disposer d'une p\u00e9riode plus longue pour analyser et enqu\u00eater sur les incidents de s\u00e9curit\u00e9. La licence suppl\u00e9mentaire Firewall Advanced Reporting offre une capacit\u00e9 de stockage encore plus importante, avec jusqu'\u00e0 100 Go ou 365 jours de conservation des logs dans Central, ce qui permet aux administrateurs informatiques et aux ing\u00e9nieurs en s\u00e9curit\u00e9 d'effectuer des analyses et un suivi des tendances encore plus d\u00e9taill\u00e9s. <\/p>\n\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-9133b606 ava-card-spacer\" id=\"avanet-services\">\n<div class=\"gb-container gb-container-62905ae0\">\n\n<h2 class=\"gb-headline gb-headline-8d5720e2\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 20 20\" fill=\"currentColor\" class=\"w-5 h-5\">   <path fill-rule=\"evenodd\" d=\"M9.661 2.237a.531.531 0 01.678 0 11.947 11.947 0 007.078 2.749.5.5 0 01.479.425c.069.52.104 1.05.104 1.59 0 5.162-3.26 9.563-7.834 11.256a.48.48 0 01-.332 0C5.26 16.564 2 12.163 2 7c0-.538.035-1.069.104-1.589a.5.5 0 01.48-.425 11.947 11.947 0 007.077-2.75zm4.196 5.954a.75.75 0 00-1.214-.882l-3.483 4.79-1.88-1.88a.75.75 0 10-1.06 1.061l2.5 2.5a.75.75 0 001.137-.089l4-5.5z\" clip-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Avanet Services<\/span><\/h2>\n\n\n\n<h2 class=\"gb-headline gb-headline-c000922f gb-headline-text\"><strong>Am\u00e9liorons<\/strong> votre s\u00e9curit\u00e9<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-85bf1781 gb-headline-text\">Nos services sont con\u00e7us pour vous aider \u00e0 faire fonctionner vos produits Sophos de mani\u00e8re s\u00fbre et fiable. En plus du support classique pour les pare-feux Sophos ou la plate-forme centrale, nous proposons les services suivants, qui peuvent \u00eatre demand\u00e9s \u00e0 tout moment :<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-37947fc7\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Services de configuration<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-a5890901\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Bilan de sant\u00e9<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-469c99da\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Mises \u00e0 niveau<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-23394641\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Ateliers<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-bf0d08bf\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Migrations<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-0a3902cc\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Maintenance du pare-feu<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-9b54ea89\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">SLA<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-d867028f\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Audits de s\u00e9curit\u00e9<\/span><\/p>\n\n\n\n<a class=\"gb-button gb-button-a1b7de4e gb-button-text\" href=\"https:\/\/www.avanet.com\/fr\/contact\/\">Demander plus d'informations<\/a>\n\n<\/div>\n\n<div class=\"gb-container gb-container-7499e21c\">\n<div class=\"gb-container gb-container-5c65e230\">\n\n<h2 class=\"gb-headline gb-headline-87d289ed\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewbox=\"0 0 34 44\"><path d=\"m1.299.002c-.738.077-1.303.708-1.299 1.45v40.601c0 .795.655 1.45 1.45 1.45h30.934c.796 0 1.45-.655 1.45-1.45v-26.101c0-.006 0-.013 0-.02 0-.796-.654-1.45-1.45-1.45-.795 0-1.45.654-1.45 1.45v.02 24.651h-28.034v-37.701h18.367v8.217c0 .795.655 1.45 1.45 1.45h9.667.003c.796 0 1.451-.655 1.451-1.45 0-.385-.154-.755-.427-1.027l-9.667-9.667c-.272-.272-.642-.424-1.027-.423h-21.267c-.05-.003-.101-.003-.151 0zm22.868 4.939 4.728 4.728h-4.728zm-4.833 9.561c-3.72 0-6.767 3.047-6.767 6.767 0 1.031.294 1.978.71 2.855-.143.278-.311.617-.544 1.057-.527.996-1.25 2.317-1.963 3.64-1.428 2.647-2.855 5.287-2.855 5.287-.382.692-.13 1.576.559 1.964l4.35 2.416c.215.12.458.183.705.183.53 0 1.02-.291 1.273-.757l5.438-9.969c3.292-.45 5.861-3.266 5.861-6.676 0-3.72-3.047-6.767-6.767-6.767zm0 2.9c.192 0 .375.019.559.046-.308.588-.708 1.34-1.178 2.205-.151.234-.231.506-.231.784 0 .796.655 1.451 1.45 1.451.566 0 1.082-.331 1.318-.845.451-.829.832-1.541 1.148-2.145.504.653.801 1.473.801 2.371 0 2.153-1.714 3.867-3.867 3.867-.528.001-1.016.291-1.269.755l-5.105 9.35-1.813-1.012c.461-.848 1.087-2.016 2.175-4.033.716-1.327 1.43-2.646 1.964-3.655.267-.505.491-.928.649-1.239.079-.155.145-.284.197-.393.025-.054.046-.108.075-.181.015-.036.033-.072.061-.166.013-.047.029-.094.045-.227.008-.066.012-.158 0-.302-.012-.143-.226-.664-.227-.664-.393-.607-.619-1.321-.619-2.1 0-2.153 1.714-3.867 3.867-3.867z\" fill-rule=\"nonzero\"><\/path><\/svg><\/span><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-c8e59303 gb-headline-text\">Services de configuration<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-849d50d0 gb-headline-text\">Vous souhaitez confier l'installation de vos produits Sophos \u00e0 des professionnels ? Nous vous assistons lors de la mise en service et de la configuration pour un fonctionnement sans faille.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-919c66aa\">\n\n<h2 class=\"gb-headline gb-headline-b70595a3\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewbox=\"0 0 33 43\"><g fill-rule=\"nonzero\"><path d=\"m7.81 17.518c.327.327.763.509 1.235.509s.872-.182 1.235-.509c.69-.69.69-1.78 0-2.434l-4.359-4.322h24.411c.945 0 1.744-.763 1.744-1.744s-.763-1.744-1.744-1.744h-24.411l4.323-4.323c.69-.69.69-1.779 0-2.433-.69-.691-1.78-.691-2.434 0l-7.265 7.265c-.69.69-.69 1.78 0 2.434z\"><\/path><path d=\"m24.302 24.51c-.69-.691-1.78-.691-2.434 0-.69.69-.69 1.78 0 2.433l4.323 4.323h-24.447c-.945 0-1.744.763-1.744 1.744 0 .944.763 1.744 1.744 1.744h24.411l-4.323 4.322c-.69.691-.69 1.78 0 2.434.327.327.763.509 1.235.509s.872-.182 1.235-.509l7.265-7.301c.69-.691.69-1.78 0-2.434z\"><\/path><\/g><\/svg><\/span><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-a5c7ecbc gb-headline-text\">Migrations<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-99426999 gb-headline-text\">Vous souhaitez passer de votre pare-feu SG (UTM) \u00e0 un pare-feu XGS avec le syst\u00e8me d'exploitation SFOS ? Gr\u00e2ce \u00e0 notre exp\u00e9rience, nous pouvons r\u00e9aliser votre transition sans probl\u00e8me.<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-547ef5b2\">\n<div class=\"gb-container gb-container-fe09310a\">\n\n<h2 class=\"gb-headline gb-headline-bd3b1646\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewbox=\"0 0 39 46\"><g><circle cx=\"6.354\" cy=\"6.354\" r=\"1.271\"><\/circle><circle cx=\"31.771\" cy=\"6.354\" r=\"1.271\"><\/circle><circle cx=\"31.771\" cy=\"34.313\" r=\"1.271\"><\/circle><circle cx=\"6.354\" cy=\"34.313\" r=\"1.271\"><\/circle><g fill-rule=\"nonzero\"><path d=\"m19.063 10.167c-5.606 0-10.167 4.56-10.167 10.166s4.561 10.167 10.167 10.167c5.605 0 10.166-4.561 10.166-10.167s-4.561-10.166-10.166-10.166zm-.854 14.505-4.493-4.493 1.797-1.797 2.696 2.696 4.493-4.493 1.797 1.797z\"><\/path><path d=\"m34.313 0h-30.501c-2.102 0-3.812 1.71-3.812 3.813v38.125c0 2.102 1.71 3.812 3.812 3.812h30.501c2.102 0 3.812-1.71 3.812-3.812v-38.126c0-2.102-1.71-3.812-3.812-3.812zm-24.146 43.208h-6.355c-.7 0-1.27-.57-1.27-1.27v-1.494c.398.142.824.223 1.27.223h6.355zm3.812 0h-1.271v-2.541h1.271zm3.813 0h-1.271v-2.541h1.271zm3.812 0h-1.271v-2.541h1.271zm3.813 0h-1.271v-2.541h1.271zm10.166-1.27c0 .7-.57 1.27-1.27 1.27h-6.355v-2.541h6.355c.446 0 .872-.081 1.27-.223zm0-38.126v33.042c0 .701-.57 1.271-1.27 1.271h-30.501c-.7 0-1.27-.57-1.27-1.271v-33.042c0-.7.57-1.27 1.27-1.27h30.501c.7 0 1.27.57 1.27 1.27z\"><\/path><\/g><\/g><\/svg><\/span><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-b2a78fde gb-headline-text\">Bilan de sant\u00e9<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-d7a0b735 gb-headline-text\">Vous avez configur\u00e9 vos produits Sophos vous-m\u00eame et vous souhaitez que nous v\u00e9rifiions la configuration ? Nous v\u00e9rifions vos param\u00e8tres et vous donnons notre recommandation.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-9fe28494\">\n\n<h2 class=\"gb-headline gb-headline-aedf3cc2\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewbox=\"0 0 49 60\"><path d=\"m22.586 4.304v-2.805c0-.822.677-1.499 1.499-1.499.823 0 1.499.677 1.499 1.499v2.805h21.087.007c.819.015 1.482.698 1.473 1.513v33.066c0 .822-.677 1.499-1.499 1.499h-14.283l7.015 14.711c.103.208.156.436.156.668 0 .822-.676 1.499-1.499 1.499-.586 0-1.122-.345-1.362-.873l-7.614-16.005h-3.481v17.668c0 .823-.676 1.499-1.499 1.499-.822 0-1.499-.676-1.499-1.499v-17.668h-3.488l-7.624 15.972c-.241.533-.773.878-1.36.881-.221 0-.439-.048-.644-.142-.52-.249-.853-.776-.853-1.353 0-.224.05-.446.147-.648l7.017-14.717h-14.282c-.822 0-1.499-.677-1.499-1.499v-33.073c0-.822.677-1.499 1.499-1.499zm-19.588 2.998v30.062h42.174v-30.062zm17.121 13.135c-.879-.961-1.374-2.223-1.374-3.54 0-2.879 2.369-5.248 5.248-5.248s5.248 2.369 5.248 5.248c0 1.317-.496 2.579-1.374 3.54 3.86 1.452 3.899 5.554 3.886 7.305v3.385c0 .822-.677 1.499-1.499 1.499h-12.523c-.822 0-1.499-.677-1.499-1.499v-3.385c0-1.753.048-5.852 3.887-7.305zm8.632 9.191-.022-1.886c0-1.884-.191-3.262-1.128-4.053-.619-.521-1.551-.769-2.921-.769h-1.421c-1.373 0-2.307.248-2.926.77-.938.79-1.129 2.168-1.129 4.052v1.886zm-4.758-14.973c-1.246 0-2.27 1.024-2.27 2.27 0 1.245 1.024 2.269 2.27 2.269h.014c1.239-.008 2.255-1.029 2.255-2.269 0-1.241-1.016-2.262-2.255-2.27z\" fill-rule=\"nonzero\"><\/path><\/svg><\/span><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-9fce7ef8 gb-headline-text\">Ateliers<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-fc658173 gb-headline-text\">Votre travail consiste-t-il \u00e0 conna\u00eetre les produits Sophos dans votre entreprise ? Nous vous proposons un entra\u00eenement cibl\u00e9, enti\u00e8rement adapt\u00e9 \u00e0 vos besoins.<\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-a7fa59d1 ava-card-zero-margin\" id=\"info-materials\">\n<div class=\"gb-container gb-container-8aeebd39\">\n\n<p class=\"gb-headline gb-headline-8b3709cd\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M4.125 3C3.089 3 2.25 3.84 2.25 4.875V18a3 3 0 003 3h15a3 3 0 01-3-3V4.875C17.25 3.839 16.41 3 15.375 3H4.125zM12 9.75a.75.75 0 000 1.5h1.5a.75.75 0 000-1.5H12zm-.75-2.25a.75.75 0 01.75-.75h1.5a.75.75 0 010 1.5H12a.75.75 0 01-.75-.75zM6 12.75a.75.75 0 000 1.5h7.5a.75.75 0 000-1.5H6zm-.75 3.75a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5H6a.75.75 0 01-.75-.75zM6 6.75a.75.75 0 00-.75.75v3c0 .414.336.75.75.75h3a.75.75 0 00.75-.75v-3A.75.75 0 009 6.75H6z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M18.75 6.75h1.875c.621 0 1.125.504 1.125 1.125V18a1.5 1.5 0 01-3 0V6.75z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Mat\u00e9riel d'information<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-ae48c488 gb-headline-text\"><strong>Approfondissez<\/strong> vos connaissances et apprenez-en plus sur \u00ab Sophos XGS Firewall \u00bb. <\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-95b4cfc3\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ds-fr.pdf\">Sophos XGS Firewall \u2013 Fiche de donn\u00e9es<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-c54621b6\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-xgs-firewall-brochure-fr.pdf\">Sophos XGS Firewall \u2013 Brochure<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-32838cfc\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-solution-brief-fr.pdf\">Sophos Firewall \u2013 Br\u00e8ve description<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-d0fe4ae6\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-central-firewall-fr.pdf\">Sophos Central Firewall \u2013 Fiche de donn\u00e9es<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-eff7e572\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-security-firewall-buyers-guide-en.pdf\">Next-Gen Firewall \u2013 Guide d'achat<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-30090077\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-security-cybersecurity-system-en.pdf\">Cybersecurity System \u2013 Guide d'achat<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-1d338d08\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-central-firewall-reporting-en.pdf\">Sophos Central Firewall Reporting \u2013 Fiche de donn\u00e9es<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-16f3f7b3\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-whitepaper-sd-wan.pdf\">Sophos Firewall et SD-WAN \u2013 Whitepaper<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-cfa4d020\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-key-new-features-2021-en.pdf\">Quoi de neuf dans Sophos Firewall \u2013 Guide pour d\u00e9butants<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-e01c6e5c\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-best-practices-to-block-ransomware-en.pdf\">La meilleure pratique pour bloquer les ransomwares \u2013 Whitepaper<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-2777bd41\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-quick-start-guide-xgs-87-87w-107-107w-en.pdf\" data-type=\"link\" data-id=\"sophos-quick-start-guide-xgs-87-87w-107-107w-en.pdf\">Sophos XGS 87(w)\/107(w) \u2013 Guide de d\u00e9marrage rapide<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-c8f10860\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-quick-start-guide-xgs-116-116w-126-126w-136-136w-en.pdf\" data-type=\"link\" data-id=\"sophos-quick-start-guide-xgs-116-116w-126-126w-136-136w-en.pdf\">Sophos XGS 116(w)\/126(w)\/136(w) \u2013 Guide de d\u00e9marrage rapide<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-eec6fbf3\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-quick-start-guide-xgs-2100-2300-3100-3300-en.pdf\" data-type=\"link\" data-id=\"sophos-quick-start-guide-xgs-2100-2300-3100-3300-en.pdf\">Sophos XGS 2100\/2300\/3100\/3300 \u2013 Guide de d\u00e9marrage rapide<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-fcb9a8fd\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-quick-start-guide-xgs-4300-4500-en.pdf\" data-type=\"link\" data-id=\"sophos-quick-start-guide-xgs-4300-4500-en.pdf\">Sophos XGS 4300\/4500 \u2013 Guide de d\u00e9marrage rapide<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-af0e91ef\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-quick-start-guide-xgs-5500-6500-en.pdf\" data-type=\"link\" data-id=\"sophos-quick-start-guide-xgs-5500-6500-en.pdf\">Sophos XGS 5500\/6500 \u2013 Guide de d\u00e9marrage rapide<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-0248cef9\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-quick-start-guide-xgs-7500-8500-en.pdf\" data-type=\"link\" data-id=\"sophos-quick-start-guide-xgs-7500-8500-en.pdf\">Sophos XGS 7500\/8500 \u2013 Guide de d\u00e9marrage rapide<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-7bbade51\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-operating-instructions-xgs-87-87w-107-107w-en.pdf\" data-type=\"link\" data-id=\"sophos-operating-instructions-xgs-87-87w-107-107w-en.pdf\">Sophos XGS 87(w)\/107(w) \u2013 Modes d\u2019emploi<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-9ead9360\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/avanet.com\/assets\/sophos-operating-instructions-xgs-116-116w-126-126w-136-136w-en.pdf\" data-type=\"link\" data-id=\"https:\/\/avanet.com\/assets\/sophos-operating-instructions-xgs-116-116w-126-126w-136-136w-en.pdf\" target=\"_blank\" rel=\"noopener\">Sophos XGS 116(w)\/126(w)\/136(w) \u2013 Modes d\u2019emploi<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-7b46f9d3\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-operating-instructions-xgs-2100-2300-3100-3300-en.pdf\" data-type=\"link\" data-id=\"sophos-operating-instructions-xgs-2100-2300-3100-3300-en.pdf\">Sophos XGS 2100\/2300\/3100\/3300 \u2013 Modes d\u2019emploi<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-19ee2783\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-operating-instructions-xgs-4300-4500-en.pdf\" data-type=\"link\" data-id=\"sophos-operating-instructions-xgs-4300-4500-en.pdf\">Sophos XGS 4300\/4500 \u2013 Modes d\u2019emploi<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-791f54ca\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-operating-instructions-xgs-5500-6500-en.pdf\" data-type=\"link\" data-id=\"sophos-operating-instructions-xgs-5500-6500-en.pdf\">Sophos XGS 5500\/6500 \u2013 Modes d\u2019emploi<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-1c968ab7\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-operating-instructions-xgs-7500-8500-en.pdf\" data-type=\"link\" data-id=\"sophos-operating-instructions-xgs-7500-8500-en.pdf\">Sophos XGS 7500\/8500 \u2013 Modes d\u2019emploi<\/a><\/span><\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-7346e745\">\n\n<figure class=\"gb-block-image gb-block-image-b8173d28\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"1074\" class=\"gb-image gb-image-b8173d28\" src=\"https:\/\/www.avanet.com\/assets\/sophos-assets-firewall.png\" alt=\"\u00c0 propos de la vignette du mat\u00e9riel Sophos Firewall\" title=\"sophos-assets-firewall\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-assets-firewall.png 1280w, https:\/\/www.avanet.com\/assets\/sophos-assets-firewall-64x54.png 64w, https:\/\/www.avanet.com\/assets\/sophos-assets-firewall-300x252.png 300w, https:\/\/www.avanet.com\/assets\/sophos-assets-firewall-1024x859.png 1024w, https:\/\/www.avanet.com\/assets\/sophos-assets-firewall-768x644.png 768w, https:\/\/www.avanet.com\/assets\/sophos-assets-firewall-600x503.png 600w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-7c6db709 ava-card-zero-margin ava-card-spacer\">\n<div class=\"gb-container gb-container-71364037\" id=\"education-government\">\n\n<p class=\"gb-headline gb-headline-61672cc7\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M9.674 2.075a.75.75 0 01.652 0l7.25 3.5A.75.75 0 0117 6.957V16.5h.25a.75.75 0 010 1.5H2.75a.75.75 0 010-1.5H3V6.957a.75.75 0 01-.576-1.382l7.25-3.5zM11 6a1 1 0 11-2 0 1 1 0 012 0zM7.5 9.75a.75.75 0 00-1.5 0v5.5a.75.75 0 001.5 0v-5.5zm3.25 0a.75.75 0 00-1.5 0v5.5a.75.75 0 001.5 0v-5.5zm3.25 0a.75.75 0 00-1.5 0v5.5a.75.75 0 001.5 0v-5.5z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">\u00c9DUCATION &amp; GOUVERNEMENT<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-ec41806a gb-headline-text\">Prix sp\u00e9ciaux pour les institutions \u00e9ducatives et gouvernementales<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-9b651157 gb-headline-text\">Sophos propose des remises sp\u00e9ciales pour les \u00e9coles et les institutions gouvernementales afin de r\u00e9pondre \u00e0 leurs exigences budg\u00e9taires particuli\u00e8res. On peut compter sur un rabais d'au moins <strong>20&nbsp; %<\/strong>*.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-7dc152d1 gb-headline-text\">Demandez-nous et nous vous ferons une offre gratuite et sans engagement.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-896d83be gb-headline-text\">* Les prix sp\u00e9ciaux pour les institutions \u00e9ducatives et gouvernementales ne sont disponibles que dans la r\u00e9gion DACH.<\/p>\n\n\n\n<a class=\"gb-button gb-button-27b36d7e gb-button-text\" href=\"https:\/\/www.avanet.com\/fr\/contact\/\">Demander des prix sp\u00e9ciaux<\/a>\n\n<\/div>\n\n<div class=\"gb-container gb-container-0ee14872\" id=\"trial-version\">\n\n<p class=\"gb-headline gb-headline-e79d319c\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M10 1a.75.75 0 01.75.75v1.5a.75.75 0 01-1.5 0v-1.5A.75.75 0 0110 1zM5.05 3.05a.75.75 0 011.06 0l1.062 1.06A.75.75 0 116.11 5.173L5.05 4.11a.75.75 0 010-1.06zm9.9 0a.75.75 0 010 1.06l-1.06 1.062a.75.75 0 01-1.062-1.061l1.061-1.06a.75.75 0 011.06 0zM3 8a.75.75 0 01.75-.75h1.5a.75.75 0 010 1.5h-1.5A.75.75 0 013 8zm11 0a.75.75 0 01.75-.75h1.5a.75.75 0 010 1.5h-1.5A.75.75 0 0114 8zm-6.828 2.828a.75.75 0 010 1.061L6.11 12.95a.75.75 0 01-1.06-1.06l1.06-1.06a.75.75 0 011.06 0zm3.594-3.317a.75.75 0 00-1.37.364l-.492 6.861a.75.75 0 001.204.65l1.043-.799.985 3.678a.75.75 0 001.45-.388l-.978-3.646 1.292.204a.75.75 0 00.74-1.16l-3.874-5.764z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Version d'essai<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-7d901e07 gb-headline-text\">Essayez <strong>gratuitement<\/strong> Sophos Firewall <\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-50c18159 gb-headline-text\">Familiarisez-vous avec l'interface utilisateur de Sophos Firewall avant de l'acheter. Constatez par vous-m\u00eame l'utilisation intuitive de ce syst\u00e8me d'exploitation avanc\u00e9 et d\u00e9couvrez toutes les fonctionnalit\u00e9s de Sophos Firewall.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-c80ea8c1 gb-headline-text\">Utilisez la d\u00e9mo en ligne pour un acc\u00e8s imm\u00e9diat directement dans votre navigateur, sans installation. Ou t\u00e9l\u00e9chargez gratuitement le logiciel Sophos Firewall (ISO) et installez-le sur votre propre mat\u00e9riel.<\/p>\n\n\n<div class=\"gb-container gb-container-2f4b592c\">\n\n<a class=\"gb-button gb-button-3879b29b gb-button-text\" href=\"https:\/\/demo.sophos.com\/webconsole\/webpages\/login.jsp\" target=\"_blank\" rel=\"noopener\">D\u00e9monstration en ligne<\/a>\n\n\n\n<a class=\"gb-button gb-button-4dfceed4\" href=\"https:\/\/www.sophos.com\/fr-fr\/products\/next-gen-firewall\/free-trial?id=0013000001EjyeY\" target=\"_blank\" rel=\"noopener\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path d=\"M10.75 2.75a.75.75 0 00-1.5 0v8.614L6.295 8.235a.75.75 0 10-1.09 1.03l4.25 4.5a.75.75 0 001.09 0l4.25-4.5a.75.75 0 00-1.09-1.03l-2.955 3.129V2.75z\"><\/path>   <path d=\"M3.5 12.75a.75.75 0 00-1.5 0v2.5A2.75 2.75 0 004.75 18h10.5A2.75 2.75 0 0018 15.25v-2.5a.75.75 0 00-1.5 0v2.5c0 .69-.56 1.25-1.25 1.25H4.75c-.69 0-1.25-.56-1.25-1.25v-2.5z\"><\/path> <\/svg><\/span><span class=\"gb-button-text\">Tester gratuitement<\/span><\/a>\n\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-6c30642c gb-headline-text\">Utilisez les donn\u00e9es de connexion suivantes pour d\u00e9marrer votre d\u00e9mo en ligne. <strong>Nom d'utilisateur<\/strong>: demo \/ <strong>Mot de passe<\/strong>: XG@dem0user<\/p>\n\n<\/div>\n<\/div><div class=\"gb-container gb-container-6291cecc ava-card-spacer last\" id=\"help-for-buying\">\n\n<p class=\"gb-headline gb-headline-04e182da\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 20 20\" fill=\"currentColor\" class=\"w-5 h-5\">   <path d=\"M3.505 2.365A41.369 41.369 0 019 2c1.863 0 3.697.124 5.495.365 1.247.167 2.18 1.108 2.435 2.268a4.45 4.45 0 00-.577-.069 43.141 43.141 0 00-4.706 0C9.229 4.696 7.5 6.727 7.5 8.998v2.24c0 1.413.67 2.735 1.76 3.562l-2.98 2.98A.75.75 0 015 17.25v-3.443c-.501-.048-1-.106-1.495-.172C2.033 13.438 1 12.162 1 10.72V5.28c0-1.441 1.033-2.717 2.505-2.914z\"><\/path>   <path d=\"M14 6c-.762 0-1.52.02-2.271.062C10.157 6.148 9 7.472 9 8.998v2.24c0 1.519 1.147 2.839 2.71 2.935.214.013.428.024.642.034.2.009.385.09.518.224l2.35 2.35a.75.75 0 001.28-.531v-2.07c1.453-.195 2.5-1.463 2.5-2.915V8.998c0-1.526-1.157-2.85-2.729-2.936A41.645 41.645 0 0014 6z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Aide \u00e0 l'achat<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-a74d99bb gb-headline-text\">Vous avez encore <strong>des questions sur le produit<\/strong>?<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-c5a9534f gb-headline-text\">Mieux vaut se renseigner avant d'acheter, avant de se retrouver avec un mauvais produit entre les mains.<\/p>\n\n\n\n<a class=\"gb-button gb-button-7a0bb7da gb-button-text\" href=\"https:\/\/www.avanet.com\/fr\/contact\/\">Poser une question<\/a>\n\n<\/div><\/div><\/article><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":36361,"template":"","meta":{"_acf_changed":false},"product_brand":[],"product_cat":[597],"product_tag":[],"class_list":{"0":"post-61682","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-uncategorized","8":"first","9":"instock","10":"taxable","11":"shipping-taxable","12":"purchasable","13":"product-type-variable","14":"has-default-attributes"},"acf":[],"_links":{"self":[{"href":"https:\/\/www.avanet.com\/fr\/wp-json\/wp\/v2\/product\/61682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.avanet.com\/fr\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.avanet.com\/fr\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.avanet.com\/fr\/wp-json\/wp\/v2\/media\/36361"}],"wp:attachment":[{"href":"https:\/\/www.avanet.com\/fr\/wp-json\/wp\/v2\/media?parent=61682"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.avanet.com\/fr\/wp-json\/wp\/v2\/product_brand?post=61682"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.avanet.com\/fr\/wp-json\/wp\/v2\/product_cat?post=61682"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.avanet.com\/fr\/wp-json\/wp\/v2\/product_tag?post=61682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}