{"id":88698,"date":"2022-11-11T14:38:36","date_gmt":"2022-11-11T13:38:36","guid":{"rendered":"https:\/\/www.avanet.com\/shop\/sophos-central-managed-detection-and-response-complete\/"},"modified":"2024-04-19T08:13:40","modified_gmt":"2024-04-19T07:13:40","slug":"sophos-central-managed-detection-and-response-complete","status":"publish","type":"product","link":"https:\/\/www.avanet.com\/fr\/shop\/sophos-central-managed-detection-and-response-complete\/","title":{"rendered":"Sophos Central Managed Detection and Response Complete"},"content":{"rendered":"<div data-block=\"hook:130542\" class=\"alignfull\"><article id=\"post-130542\" class=\"post-130542\"><div class=\"entry-content is-layout-constrained\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-a50b114d overflow-x-auto ava-card-spacer\">\n<div class=\"gb-container gb-container-57c73bc9\">\n<div class=\"gb-container gb-container-5e6c23b9\">\n\n<a class=\"gb-button gb-button-75931100 gb-button-text\" href=\"#product-description\">Description<\/a>\n\n\n\n<a class=\"gb-button gb-button-684575e7 gb-button-text\" href=\"#avanet-services\">Services<\/a>\n\n\n\n<a class=\"gb-button gb-button-8f7ca155 gb-button-text\" href=\"#info-materials\">Mat\u00e9riel d'information<\/a>\n\n\n\n<a class=\"gb-button gb-button-826fa0e4 gb-button-text\" href=\"#trial-version\">Version d'essai<\/a>\n\n\n\n<a class=\"gb-button gb-button-fda0e505 gb-button-text\" href=\"#help-for-buying\">Aide \u00e0 l'achat<\/a>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-29320c59\" id=\"product-description\">\n\n<p class=\"gb-headline gb-headline-8fb21070\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M4.5 2A1.5 1.5 0 003 3.5v13A1.5 1.5 0 004.5 18h11a1.5 1.5 0 001.5-1.5V7.621a1.5 1.5 0 00-.44-1.06l-4.12-4.122A1.5 1.5 0 0011.378 2H4.5zm2.25 8.5a.75.75 0 000 1.5h6.5a.75.75 0 000-1.5h-6.5zm0 3a.75.75 0 000 1.5h6.5a.75.75 0 000-1.5h-6.5z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Description<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-sophos-managed-detection-and-response-kunstliche-intelligenz-gemischt-mit-menschlicher-expertise\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.645), 24px);font-style:normal;font-weight:600\">Sophos Managed Detection and Response<strong> \u2013 L'intelligence artificielle m\u00e9lang\u00e9e \u00e0 l'expertise humaine<\/strong><\/h2>\n\n\n\n<p>Avec \u00ab Sophos Central MDR \u00bb, vous atteignez le plus haut niveau de s\u00e9curit\u00e9 que Sophos peut actuellement offrir pour la protection de vos syst\u00e8mes d'extr\u00e9mit\u00e9 (macOS 10.15+, Windows 8.1+). Dans ce bundle, vous obtenez toutes les fonctionnalit\u00e9s d'<a href=\"https:\/\/www.avanet.com\/fr\/shop\/sophos-central-intercept-x-advanced-avec-xdr\/\">Intercept X Advanced avec XDR<\/a> et le nouveau service MDR \u00e9tendu.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-aktive-bekampfung-von-bedrohungen-durch-ein-expertenteam-24-7\" style=\"font-style:normal;font-weight:600\"><strong>Lutte active contre les menaces par une \u00e9quipe d'experts - 24h\/24 et 7j\/7<\/strong><\/h3>\n\n\n\n<p>Avec le service MDR, Sophos met \u00e0 disposition un \u00ab Service Operation Center \u00bb (SOC) \u00e0 haute disponibilit\u00e9. C'est le compl\u00e9ment parfait pour tous les administrateurs informatiques o\u00f9 il n'y a pas de ressources libres pour aller eux-m\u00eames \u00e0 la recherche des menaces avec les outils de XDR. Il faut un personnel hautement qualifi\u00e9 et sp\u00e9cialis\u00e9 pour rechercher de mani\u00e8re proactive les menaces potentielles sur le r\u00e9seau avec <a href=\"https:\/\/www.avanet.com\/blog\/wozu-endpoint-detection-and-response-edr\/\">XDR<\/a> et pour prendre les mesures correctes en cas d'attaque.<br\/>Avec Sophos Central MDR pour serveurs, vous n'avez plus besoin de chercher vous-m\u00eame du personnel form\u00e9. Sophos met \u00e0 disposition une \u00e9quipe d'experts qui se consacrent 24h\/24 et 7j\/7 \u00e0 la lutte contre les menaces.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-funktionsumfang-von-mdr-complete\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.645), 24px);font-style:normal;font-weight:600\"><strong><strong>Fonctionnalit\u00e9s<\/strong> de MDR Complete<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-24-7-indizienbasierte-bedrohungssuche\" style=\"font-style:normal;font-weight:600\">Recherche de menaces bas\u00e9e sur des indices 24h\/24 et 7j\/7<\/h3>\n\n\n\n<p>Si quelque chose a \u00e9t\u00e9 d\u00e9tect\u00e9 sur votre syst\u00e8me qui n'a pas pu \u00eatre corrig\u00e9 automatiquement et qui n\u00e9cessite une expertise humaine, l'\u00e9quipe MDR est \u00e0 votre disposition sur une base 24\/7. Un expert examine alors attentivement la remarque critique et d\u00e9cide, sur la base de son exp\u00e9rience, de ce qui doit \u00eatre fait.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-24-7-indizienlose-bedrohungssuche\" style=\"font-style:normal;font-weight:600\">Recherche de menaces sans indices 24h\/24 et 7j\/7<\/h3>\n\n\n\n<p>Les analystes de l'\u00e9quipe MDR examinent de pr\u00e8s les appareils ou comptes utilisateurs particuli\u00e8rement importants dans votre entreprise. Ils examinent la mani\u00e8re dont le r\u00e9seau communique, si des processus suspects sont en cours d'ex\u00e9cution ou si un comportement inhabituel ou atypique peut \u00eatre constat\u00e9. Les donn\u00e9es collect\u00e9es sont utilis\u00e9es pour tenter de pr\u00e9dire la strat\u00e9gie des attaquants et d'identifier de nouveaux indicateurs d'attaque (IoA).<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-angriffserkennung\" style=\"font-style:normal;font-weight:600\">D\u00e9tection des attaques<\/h3>\n\n\n\n<p>L'\u00e9quipe MDR accorde une attention particuli\u00e8re aux attaques ex\u00e9cut\u00e9es via des processus s\u00e9rieux, comme PowerShell. De telles attaques sont souvent couronn\u00e9es de succ\u00e8s, car elles sont difficiles \u00e0 d\u00e9tecter par les outils de surveillance. L'\u00e9quipe MDR surveille ces processus \u00e0 l'aide de m\u00e9thodes d'analyse d\u00e9velopp\u00e9es en interne afin de s'assurer qu'ils ne sont pas utilis\u00e9s \u00e0 des fins malveillantes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-security-health-check\" style=\"font-style:normal;font-weight:600\">Contr\u00f4le de sant\u00e9 de s\u00e9curit\u00e9<\/h3>\n\n\n\n<p>Le Security Health Check garantit que vos produits Sophos Central fonctionnent toujours au maximum de leurs performances. Pour ce faire, l'\u00e9quipe MDR se penche sur vos exigences en mati\u00e8re de r\u00e9seau et formule des recommandations pour les modifications de configuration.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-aktivitatsreports\" style=\"font-style:normal;font-weight:600\">Rapports d'activit\u00e9<\/h3>\n\n\n\n<p>Vous d\u00e9couvrirez l'\u00e9tat actuel de vos syst\u00e8mes, les informations recueillies au cours de la p\u00e9riode de rapport et les menaces qui ont pu \u00eatre \u00e9cart\u00e9es. Un histogramme de ces rapports est alors cr\u00e9\u00e9 sur la p\u00e9riode pendant laquelle vous utilisez le service MDR. A l'aide de ces donn\u00e9es, Sophos \u00e9tablit des \"tableaux de bord\" qui permettent de se comparer aux p\u00e9riodes pr\u00e9c\u00e9dentes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-dedizierter-ansprechpartner\" style=\"font-style:normal;font-weight:600\">Contact d\u00e9di\u00e9<\/h3>\n\n\n\n<p>Lorsqu'un incident est d\u00e9tect\u00e9, un responsable de r\u00e9action d\u00e9di\u00e9 vous est attribu\u00e9 et vous assiste par t\u00e9l\u00e9phone dans la r\u00e9solution compl\u00e8te du probl\u00e8me !<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-direkter-telefon-support\" style=\"font-style:normal;font-weight:600\">Assistance t\u00e9l\u00e9phonique directe<\/h3>\n\n\n\n<p>Un autre avantage de la variante MDR Complete est un acc\u00e8s direct \u00e0 l'\u00e9quipe d'analystes MDR, qui est joignable 24h\/24 et 7j\/7 pour votre \u00e9quipe. Ainsi, si vous avez une question ou si vous souhaitez par exemple parler d'une menace particuli\u00e8re, vous pouvez contacter le Security Operations Center (SOC) directement par t\u00e9l\u00e9phone.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-optimierte-telemetriedaten\" style=\"font-style:normal;font-weight:600\">Donn\u00e9es t\u00e9l\u00e9m\u00e9triques optimis\u00e9es<\/h3>\n\n\n\n<p>Pour une meilleure t\u00e9l\u00e9m\u00e9trie, la version compl\u00e8te va au-del\u00e0 de la simple d\u00e9tection des \u00e9v\u00e9nements sur le point d'acc\u00e8s et inclut des donn\u00e9es provenant d'autres produits Central ou de fournisseurs tiers pris en charge dans l'analyse des menaces.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-proaktive-verbesserung-des-sicherheitsstatus\" style=\"font-style:normal;font-weight:600\">Am\u00e9lioration proactive de l'\u00e9tat de s\u00e9curit\u00e9<\/h3>\n\n\n\n<p>Avec MDR Complete, le Security Health Check passe au niveau sup\u00e9rieur. Alors que dans la variante MDR normale, des recommandations g\u00e9n\u00e9rales sont \u00e9mises pour la configuration des produits Central, l'\u00e9quipe MDR tient d\u00e9sormais compte du contexte commercial derri\u00e8re les param\u00e8tres de configuration d'une politique, par exemple. Vous recevez de l'aide pour corriger les vuln\u00e9rabilit\u00e9s de configuration et d'architecture qui ont un impact n\u00e9gatif sur votre s\u00e9curit\u00e9.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-asset-erkennung\" style=\"font-style:normal;font-weight:600\">Reconnaissance des actifs<\/h3>\n\n\n\n<p>Le personnel sp\u00e9cialis\u00e9 de Sophos ne se contente pas d'examiner avec vous les processus op\u00e9rationnels critiques, mais se procure \u00e9galement une vue d'ensemble des applications utilis\u00e9es et identifie les points d'attaque potentiels qu'elles peuvent cr\u00e9er dans le syst\u00e8me. Pour ce faire, l'\u00e9quipe MDR tient compte de ce que l'on appelle un \"inventaire des actifs\", qui les aide \u00e0 comprendre quelles applications sont ex\u00e9cut\u00e9es sur un point d'acc\u00e8s et si elles sont affect\u00e9es par des vuln\u00e9rabilit\u00e9s ouvertes. Il en r\u00e9sulte des informations d\u00e9taill\u00e9es pr\u00e9cieuses, sp\u00e9cialement adapt\u00e9es \u00e0 votre entreprise.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-onboarding-prozess-mit-maximaler-kontrolle-und-transparenz\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.645), 24px);font-style:normal;font-weight:600\"><strong>Processus d'onboarding<\/strong> avec un maximum de contr\u00f4le et de transparence<\/h2>\n\n\n\n<p>Que vous optiez pour la variante MDR normale ou MDR Complete, vous gardez le contr\u00f4le sur le degr\u00e9 d'autonomie de l'\u00e9quipe MDR. Cela est r\u00e9gl\u00e9 d\u00e8s le d\u00e9but par le <strong>processus d'onboarding<\/strong>. Lorsque vous achetez le service Sophos MDR, vous pouvez choisir parmi trois options qui d\u00e9terminent la r\u00e9ponse que vous attendez de l'\u00e9quipe MDR :<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-benachrichtigung\" style=\"font-style:normal;font-weight:600\">Notification<\/h3>\n\n\n\n<p>Si l'\u00e9quipe MDR de Sophos a identifi\u00e9 une menace ou une attaque, \u00e0 ce niveau, elle vous en informera seulement, mais n'interviendra pas pour vous de mani\u00e8re autonome. Vous recevrez toutefois un rapport d\u00e9taill\u00e9 sur la cause et la d\u00e9tection, avec des \u00e9tapes r\u00e9alisables pour \u00e9liminer manuellement le danger.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-zusammenarbeit\" style=\"font-style:normal;font-weight:600\">Coop\u00e9ration<\/h3>\n\n\n\n<p>L'\u00e9quipe MDR de Sophos travaille en collaboration avec votre \u00e9quipe informatique ou m\u00eame avec une soci\u00e9t\u00e9 de conseil externe pour r\u00e9pondre aux menaces appropri\u00e9es.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-autorisierung\" style=\"font-style:normal;font-weight:600\">Autorisation<\/h3>\n\n\n\n<p>Dans ce cas, l'\u00e9quipe MDR s'occupe de mani\u00e8re totalement autonome des actions de confinement et de neutralisation et vous informe simplement des mesures prises.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-enthaltene-integrationen-keine-zusatzlichen-kosten\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.645), 24px);font-style:normal;font-weight:600\">Int\u00e9grations incluses<strong> - pas de frais suppl\u00e9mentaires<\/strong><\/h2>\n\n<p>Les donn\u00e9es de s\u00e9curit\u00e9 provenant des sources suivantes peuvent \u00eatre int\u00e9gr\u00e9es gratuitement pour \u00eatre utilis\u00e9es par l'\u00e9quipe MDR de Sophos. Les sources de t\u00e9l\u00e9m\u00e9trie sont utilis\u00e9es pour augmenter la visibilit\u00e9 de votre environnement, g\u00e9n\u00e9rer de nouvelles d\u00e9tections de menaces et am\u00e9liorer la fiabilit\u00e9 des d\u00e9tections de menaces existantes.<\/p>\n<div class=\"gb-container gb-container-42d8a81a\">\n<div class=\"gb-container gb-container-ce081f4b\">\n\n<h2 class=\"gb-headline gb-headline-ec6d21c2\"><span class=\"gb-icon\"><svg xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 60 52\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <clippath id=\"a\">     <path d=\"m-.098 51.961h60.002v-52.082h-60.002v52.082z\" clip-rule=\"nonzero\"><\/path>   <\/clippath>   <g fill-rule=\"nonzero\" fill=\"#005bc8\" clip-path=\"url(#a)\">     <path d=\"m16.663 0c-1.976 0-4.246.858-5.892 2.192-1.745 1.415-2.782 3.813-3.009 4.694l-7.762 44.989h42.167c2.673 0 8.255-.453 10.051-7.563l7.639-44.312zm1.492 33.566-2.188-5.443-4.084 5.443h-3.293l6.125-7.769-3.109-7.418h3.054l2.065 5.186 3.933-5.192h3.253l-5.962 7.493 3.306 7.694zm17.425-9.175-.762 4.198c-.253 1.496-1.34 4.977-5.945 4.977h-6.249l.038-.206 2.645-14.981h4.366c2.249 0 3.911.615 4.938 1.83.899 1.065 1.242 2.547.969 4.182zm10.005 3.461 1.622 5.714h-2.861l-1.521-5.362h-3.001l-.951 5.362h-2.831l.038-.206 2.645-14.981h4.526c5.151 0 5.925 2.725 5.925 4.351.004 1.52-.468 4.184-3.591 5.122z\"><\/path>     <path d=\"m29.741 20.892h-2.04l-1.778 10.161h2.892c2.505 0 3.092-1.928 3.229-2.757l.696-3.923c.139-.765.174-1.833-.442-2.574-.503-.607-1.362-.907-2.557-.907z\"><\/path>     <path d=\"m43.233 20.808h-2.098l-.888 5.01h2.816c2.72 0 3.291-1.611 3.291-2.96 0-.88-.323-2.05-3.121-2.05z\"><\/path>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">Sophos XDR<\/span><\/h2>\n\n\n\n<p>La seule plate-forme XDR qui combine les int\u00e9grations natives des syst\u00e8mes d'extr\u00e9mit\u00e9, des serveurs, des pare-feux, du cloud, de la messagerie \u00e9lectronique, de la mobilit\u00e9 et de Microsoft.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#94a3b8;font-size:14px\">Inclus dans les prix de Sophos MDR et Sophos MDR Complete.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-723cbe56\">\n\n<h2 class=\"gb-headline gb-headline-4b6e17d4\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 60 52\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <path fill-rule=\"nonzero\" fill=\"#005bc8\" d=\"m16.663 0c-1.976 0-4.246.858-5.892 2.195-1.744 1.412-2.782 3.81-3.009 4.691l-7.762 44.989h42.167c2.673 0 8.255-.453 10.051-7.563l7.639-44.312zm10.979 20.873h-7.334l-.696 3.994h6.868l-.418 2.493h-6.895l-1.099 6.211h-2.832l.037-.209 2.645-14.981h10.161zm12.294 12.701h-2.592l-1.104-7.753-3.877 7.753h-2.574l-.015-.158-1.183-11.47h2.645l.557 7.804 3.712-7.804h2.636l.934 7.816 3.341-7.816h2.838z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Sophos Firewall<\/span><\/h2>\n\n\n\n<p>Surveiller et filtrer le trafic r\u00e9seau entrant et sortant afin de bloquer les menaces avanc\u00e9es avant qu'elles ne causent des dommages.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#94a3b8;font-size:14px\">Le produit est vendu s\u00e9par\u00e9ment ; il est int\u00e9gr\u00e9 sans suppl\u00e9ment de prix.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-c53afc3f\">\n\n<h2 class=\"gb-headline gb-headline-45f8296f\"><span class=\"gb-icon\"><svg xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 60 52\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <clippath id=\"a\">     <path d=\"m-.098 51.721h59.762v-51.841h-59.762v51.841z\" clip-rule=\"nonzero\"><\/path>   <\/clippath>   <g fill-rule=\"nonzero\" fill=\"#005bc8\" clip-path=\"url(#a)\">     <path d=\"m36.966 23.913c-1.802 0-2.449 1.447-2.669 2.662l-.314 1.854c-.16.863-.049 1.529.327 1.982.375.455 1.062.704 2.004.704 1.315 0 2.064-.745 2.357-2.345l.379-2.132c.167-.954.064-1.667-.307-2.105-.347-.41-.943-.62-1.777-.62z\"><\/path>     <path d=\"m16.596 0c-1.968 0-4.229.854-5.868 2.182-1.738 1.408-2.771 3.795-2.997 4.673l-7.731 44.78h41.998c2.663 0 8.222-.45 10.011-7.528l7.608-44.107h-43.021zm11.841 26.635h-6.716l-.757 4.247h7.473l-.416 2.419h-10.299l.038-.206 2.635-14.912h10.002l-.45 2.418h-7.153l-.651 3.7h6.717zm13.31-.188-.522 2.983c-.453 2.5-2.249 4.111-4.576 4.111-1.467 0-2.66-.462-3.352-1.279l-.854 4.836h-2.675l2.694-15.372h2.401l-.076.916c.744-.754 1.756-1.147 2.959-1.147 1.339 0 2.478.48 3.211 1.351.757.906 1.039 2.184.794 3.601z\"><\/path>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">Sophos Endpoint Protection<\/span><\/h2>\n\n\n\n<p>Bloquez les menaces avanc\u00e9es et d\u00e9tectez les comportements malveillants, y compris les attaquants qui se font passer pour des utilisateurs l\u00e9gitimes.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#94a3b8;font-size:14px\">Inclus dans les prix de Sophos MDR et Sophos MDR Complete.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-a2f237ba\">\n\n<h2 class=\"gb-headline gb-headline-e7ba472a\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 61 52\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <path fill-rule=\"nonzero\" fill=\"#005bc8\" d=\"m16.729 0c-1.983 0-4.263.858-5.915 2.192-1.752 1.415-2.794 3.813-3.021 4.694l-7.793 44.989h42.335c2.684 0 8.288-.453 10.091-7.564l7.669-44.311zm8.206 24.528-.419 2.344h-6.775l-.765 4.269h7.533l-.42 2.43h-10.379l.036-.209 2.656-14.981h10.081l-.448 2.43h-7.213l-.654 3.717zm19.787 1.733-1.3 7.31h-2.714l1.205-6.839c.111-.604.147-1.434-.311-1.982-.335-.405-.901-.611-1.677-.611-1.461 0-2.314.855-2.607 2.609l-1.213 6.824h-2.718l1.203-6.839c.112-.603.149-1.433-.308-1.982-.336-.405-.902-.609-1.684-.609-1.444 0-2.302.881-2.627 2.694l-1.193 6.737h-2.715l2.079-11.628h2.424l-.093.97c.765-.781 1.817-1.204 3.016-1.204 1.624 0 2.89.686 3.528 1.891.845-1.205 2.213-1.891 3.795-1.891 1.335 0 2.465.47 3.177 1.321.713.851.958 1.977.733 3.229z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Sophos Email\u200b<\/span><\/h2>\n\n\n\n<p>Prot\u00e9gez votre bo\u00eete de r\u00e9ception des logiciels malveillants et profitez d'une IA avanc\u00e9e qui emp\u00eache les usurpations d'identit\u00e9 cibl\u00e9es et les attaques de phishing.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#94a3b8;font-size:14px\">Le produit est vendu s\u00e9par\u00e9ment ; il est int\u00e9gr\u00e9 sans suppl\u00e9ment de prix.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-b7f9d2ea\">\n\n<h2 class=\"gb-headline gb-headline-083ee923\"><span class=\"gb-icon\"><svg xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 60 52\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <clippath id=\"a\">     <path d=\"m-.098 51.961h60.002v-52.082h-60.002v52.082z\" clip-rule=\"nonzero\"><\/path>   <\/clippath>   <g fill-rule=\"nonzero\" fill=\"#005bc8\" clip-path=\"url(#a)\">     <path d=\"m16.663 0c-1.976 0-4.246.858-5.892 2.192-1.744 1.415-2.782 3.813-3.009 4.694l-7.762 44.989h42.167c2.673 0 8.255-.453 10.051-7.564l7.639-44.311zm10.802 22.916-.063.47h-2.784l.071-.518c.088-.68-.047-1.23-.398-1.632-.463-.528-1.302-.795-2.493-.795-2.654 0-3.202 2.126-3.315 2.776l-.825 4.687c-.11.665-.123 1.606.451 2.284.491.583 1.333.878 2.506.878 2.474 0 2.923-1.766 2.995-2.307l.139-.68h2.757l-.139.963c-.301 2.093-1.983 4.539-5.734 4.539-2.252 0-3.897-.597-4.872-1.774-.863-1.038-1.167-2.536-.859-4.22l.801-4.662c.418-2.417 2.258-4.999 6.155-4.999 2.189 0 3.78.558 4.733 1.646.954 1.087.999 2.421.874 3.344zm5.54-5.185-2.732 15.617h-2.704l.035-.208 2.73-15.617h2.706zm12.238 0-2.731 15.617h-2.411l.075-.913c-.737.752-1.753 1.146-2.971 1.146-1.343 0-2.488-.486-3.223-1.37-.756-.91-1.032-2.183-.775-3.586l.507-3.007c.462-2.549 2.227-4.132 4.612-4.132 1.475 0 2.665.46 3.341 1.276l.929-5.239h2.682z\"><\/path>     <path d=\"m38.644 23.916c-1.322 0-2.073.749-2.367 2.356l-.38 2.161c-.167.954-.061 1.666.313 2.115.348.418.944.624 1.775.624 1.809 0 2.457-1.454 2.682-2.674l.315-1.814c.165-.902.054-1.596-.333-2.057-.385-.462-1.061-.711-2.005-.711z\"><\/path>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">Sophos Cloud<\/span><\/h2>\n\n\n\n<p>Arr\u00eatez les attaques en nuage et obtenez une vue d'ensemble de vos principaux services en nuage, y compris AWS, Azure et la plateforme Google Cloud.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#94a3b8;font-size:14px\">Le produit est vendu s\u00e9par\u00e9ment ; il est int\u00e9gr\u00e9 sans suppl\u00e9ment de prix.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-0814d94f\">\n\n<h2 class=\"gb-headline gb-headline-c22fa651\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 57 51\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <g fill-rule=\"nonzero\" fill=\"#0ca406\">     <path d=\"m46.691 13.509h-21.831v-2.119c0-1.589-.616-3.082-1.735-4.204-1.119-1.124-2.606-1.742-4.188-1.742h-15.01c-2.166 0-3.927 1.769-3.927 3.943v36.46c0 2.37 1.921 4.299 4.282 4.299h42.409c2.361 0 4.281-1.929 4.281-4.299v-28.04c0-2.37-1.92-4.298-4.281-4.298zm2.519 32.338c0 1.395-1.129 2.53-2.519 2.53h-42.409c-1.39 0-2.52-1.135-2.52-2.53v-36.46c0-1.199.972-2.174 2.165-2.174h15.01c1.112 0 2.156.434 2.942 1.223s1.219 1.838 1.219 2.954v3.004c0 .489.394.884.881.884h22.712c1.39 0 2.519 1.134 2.519 2.529z\"><\/path>     <path d=\"m52.112 8.065h-21.829v-2.117c0-1.588-.616-3.081-1.736-4.206-1.103-1.107-2.629-1.742-4.187-1.742h-15.01c-2.167 0-3.928 1.769-3.928 3.943 0 .489.394.884.881.884.488 0 .881-.395.881-.884 0-1.199.972-2.174 2.166-2.174h15.01c1.094 0 2.167.446 2.941 1.224.787.79 1.22 1.84 1.22 2.955v3.001c0 .49.394.885.881.885h22.71c1.389 0 2.52 1.135 2.52 2.531v28.04c0 1.394-1.131 2.528-2.52 2.528-.487 0-.881.396-.881.885s.394.884.881.884c2.361 0 4.282-1.928 4.282-4.297v-28.04c0-2.371-1.921-4.3-4.282-4.3z\"><\/path>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">R\u00e9tention des donn\u00e9es sur 90 jours<\/span><\/h2>\n\n\n\n<p>Stocke les donn\u00e9es de tous les produits Sophos et de tous les produits tiers (non-Sophos) dans le Sophos Data Lake.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#94a3b8;font-size:14px\">Inclus dans les prix de Sophos MDR et Sophos MDR Complete.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-70a0ecc9\">\n\n<h2 class=\"gb-headline gb-headline-97b104bf\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 46 46\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <path fill=\"#f25022\" d=\"m0 0h21.917v21.917h-21.917z\"><\/path>   <path fill=\"#00a4ef\" d=\"m0 23.443h21.917v21.917h-21.917z\"><\/path>   <path fill=\"#7fba00\" d=\"m23.923 0h21.917v21.917h-21.917z\"><\/path>   <path fill=\"#ffb900\" d=\"m23.923 23.443h21.917v21.917h-21.917z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Microsoft Graph Security\u200b<\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Microsoft Defender for Endpoint<\/li>\n\n\n\n<li>Microsoft Defender for Cloud<\/li>\n\n\n\n<li>Microsoft Defender for Cloud Apps<\/li>\n\n\n\n<li>Microsoft Defender for Identity<\/li>\n\n\n\n<li>Protection de l'identit\u00e9 (Azure AD)<\/li>\n\n\n\n<li>Microsoft Azure Sentinel<\/li>\n\n\n\n<li>Office 365 Security and Compliance Center<\/li>\n\n\n\n<li>Azure Information Protection<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-5214f9a8\">\n\n<h2 class=\"gb-headline gb-headline-ef052594\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 46 46\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <path fill=\"#f25022\" d=\"m0 0h21.917v21.917h-21.917z\"><\/path>   <path fill=\"#00a4ef\" d=\"m0 23.443h21.917v21.917h-21.917z\"><\/path>   <path fill=\"#7fba00\" d=\"m23.923 0h21.917v21.917h-21.917z\"><\/path>   <path fill=\"#ffb900\" d=\"m23.923 23.443h21.917v21.917h-21.917z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Office 365 Management Activity<\/span><\/h2>\n\n\n\n<p>Fournit des informations sur les actions et les \u00e9v\u00e9nements des utilisateurs, des administrateurs, des syst\u00e8mes et des politiques \u00e0 partir des journaux d'activit\u00e9 d'Office 365 et d'Azure Active Directory.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-222c7c3a\">\n\n<h2 class=\"gb-headline gb-headline-6bb1f9b3\"><span class=\"gb-icon\"><svg xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 62 45\" stroke-miterlimit=\"10\" stroke-linejoin=\"round\" stroke-linecap=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <clippath id=\"a\">     <path d=\"m-1.85 45.506h64.801v-47.279h-64.802l.001 47.279z\" clip-rule=\"nonzero\"><\/path>   <\/clippath>   <g stroke-width=\"1.46\" stroke=\"#930cd3\" fill=\"none\" clip-path=\"url(#a)\">     <path d=\"m47.129 12.799h2.907\"><\/path>     <path d=\"m31.525 12.799h10.792\"><\/path>     <path d=\"m55.287 5.294h-48.622v28.172h48.622z\"><\/path>     <path d=\"m59.331 38.093v-35.163c0-1.215-.845-2.199-1.884-2.199h-52.943c-1.041 0-1.883.984-1.883 2.199v35.163z\"><\/path>     <path d=\"m.731 38.157v3.083c0 1.214.844 2.197 1.884 2.197h56.723c1.042 0 1.883-.983 1.883-2.197v-3.083h-60.49z\"><\/path>     <path d=\"m25.567 40.869h10.818l1.26-2.776h-13.338z\"><\/path>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">Protection des syst\u00e8mes d'extr\u00e9mit\u00e9 par des tiers<\/span><\/h2>\n\n\n\n<p>Compatible avec ...<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Microsoft<\/li>\n\n\n\n<li>CrowdStrike<\/li>\n\n\n\n<li>SentinelOne<\/li>\n\n\n\n<li>Check Point<\/li>\n\n\n\n<li>Trend Micro<\/li>\n\n\n\n<li>BlackBerry (Cylance)<\/li>\n\n\n\n<li>McAfee<\/li>\n\n\n\n<li>Malwarebytes<\/li>\n<\/ul>\n\n<\/div>\n<\/div>\n<h2 class=\"wp-block-heading\" id=\"h-add-on-integrationen\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.645), 24px);font-style:normal;font-weight:600\">Add-On<strong>- Int\u00e9gration<\/strong><\/h2>\n\n<p>Les donn\u00e9es de s\u00e9curit\u00e9 provenant des sources tierces suivantes peuvent \u00eatre int\u00e9gr\u00e9es \u00e0 l'\u00e9quipe d'exploitation Sophos MDR par l'achat de packs d'int\u00e9gration.<\/p>\n<div class=\"gb-container gb-container-68ae1c24\">\n<div class=\"gb-container gb-container-2725d7bc\">\n\n<h2 class=\"gb-headline gb-headline-90d7cfb8\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 62 41\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <g fill=\"#930cd3\">     <path d=\"m51.894 9.187c0-.564-.456-1.021-1.017-1.021-.562 0-1.018.457-1.018 1.021 0 .563.456 1.02 1.018 1.02.561 0 1.017-.457 1.017-1.02z\"><\/path>     <path d=\"m47.824 9.187c0-.564-.456-1.021-1.018-1.021-.561 0-1.017.457-1.017 1.021 0 .563.456 1.02 1.017 1.02.562 0 1.018-.457 1.018-1.02z\"><\/path>     <path d=\"m53.929 12.249c0-.564-.456-1.021-1.017-1.021-.562 0-1.018.457-1.018 1.021 0 .563.456 1.02 1.018 1.02.561 0 1.017-.457 1.017-1.02z\"><\/path>     <path d=\"m49.859 12.249c0-.564-.456-1.021-1.018-1.021-.561 0-1.017.457-1.017 1.021 0 .563.456 1.02 1.017 1.02.562 0 1.018-.457 1.018-1.02z\"><\/path>     <path d=\"m43.754 9.187c0-.564-.456-1.021-1.018-1.021-.561 0-1.017.457-1.017 1.021 0 .563.456 1.02 1.017 1.02.562 0 1.018-.457 1.018-1.02z\"><\/path>     <path d=\"m45.789 12.249c0-.564-.456-1.021-1.018-1.021-.561 0-1.017.457-1.017 1.021 0 .563.456 1.02 1.017 1.02.562 0 1.018-.457 1.018-1.02z\"><\/path>     <path d=\"m39.684 9.187c0-.564-.456-1.021-1.018-1.021-.561 0-1.017.457-1.017 1.021 0 .563.456 1.02 1.017 1.02.562 0 1.018-.457 1.018-1.02z\"><\/path>     <path d=\"m41.719 12.249c0-.564-.456-1.021-1.018-1.021-.561 0-1.017.457-1.017 1.021 0 .563.456 1.02 1.017 1.02.562 0 1.018-.457 1.018-1.02z\"><\/path>     <path d=\"m35.613 9.187c0-.564-.455-1.021-1.017-1.021s-1.018.457-1.018 1.021c0 .563.456 1.02 1.018 1.02s1.017-.457 1.017-1.02z\"><\/path>     <path d=\"m37.649 12.249c0-.564-.456-1.021-1.018-1.021s-1.018.457-1.018 1.021c0 .563.456 1.02 1.018 1.02s1.018-.457 1.018-1.02z\"><\/path>     <path fill-rule=\"nonzero\" d=\"m61.052 16.73v-12.026c0-2.594-2.103-4.704-4.688-4.704h-51.675c-2.586 0-4.689 2.109-4.689 4.704v12.026c0 1.5.715 2.822 1.808 3.684-1.093.862-1.808 2.184-1.808 3.683v12.027c0 2.594 2.103 4.704 4.689 4.704h51.675c2.585 0 4.688-2.11 4.688-4.704v-12.026c0-1.5-.715-2.822-1.808-3.684 1.093-.862 1.808-2.184 1.808-3.684zm-2.035 7.368v12.026c0 1.468-1.191 2.662-2.653 2.662h-51.675c-1.463.001-2.654-1.193-2.654-2.662v-12.027c0-1.468 1.191-2.662 2.654-2.662h51.674c1.463 0 2.654 1.194 2.654 2.663zm-54.328-4.704c-1.463 0-2.654-1.195-2.654-2.664v-12.026c0-1.468 1.191-2.663 2.654-2.663h51.674c1.463 0 2.654 1.195 2.654 2.663v12.026c0 1.469-1.191 2.663-2.653 2.663h-51.675v.001z\"><\/path>     <path fill-rule=\"nonzero\" d=\"m10.684 34.704c2.525 0 4.579-2.06 4.579-4.593 0-2.532-2.054-4.593-4.579-4.593-2.524 0-4.579 2.06-4.579 4.593 0 2.534 2.055 4.593 4.579 4.593zm0-7.145c1.402 0 2.544 1.144 2.544 2.552s-1.142 2.552-2.544 2.552-2.544-1.144-2.544-2.552 1.142-2.552 2.544-2.552z\"><\/path>     <path d=\"m51.894 28.58c0-.563-.456-1.021-1.017-1.021-.562 0-1.018.458-1.018 1.021 0 .564.456 1.021 1.018 1.021.561 0 1.017-.457 1.017-1.021z\"><\/path>     <path d=\"m47.824 28.58c0-.563-.456-1.021-1.018-1.021-.561 0-1.017.458-1.017 1.021 0 .564.456 1.021 1.017 1.021.562 0 1.018-.457 1.018-1.021z\"><\/path>     <path d=\"m53.929 31.642c0-.563-.456-1.02-1.017-1.02-.562 0-1.018.457-1.018 1.02 0 .564.456 1.021 1.018 1.021.561 0 1.017-.457 1.017-1.021z\"><\/path>     <path d=\"m49.859 31.642c0-.563-.456-1.02-1.018-1.02-.561 0-1.017.457-1.017 1.02 0 .564.456 1.021 1.017 1.021.562 0 1.018-.457 1.018-1.021z\"><\/path>     <path d=\"m43.754 28.58c0-.563-.456-1.021-1.018-1.021-.561 0-1.017.458-1.017 1.021 0 .564.456 1.021 1.017 1.021.562 0 1.018-.457 1.018-1.021z\"><\/path>     <path d=\"m45.789 31.642c0-.563-.456-1.02-1.018-1.02-.561 0-1.017.457-1.017 1.02 0 .564.456 1.021 1.017 1.021.562 0 1.018-.457 1.018-1.021z\"><\/path>     <path d=\"m39.684 28.58c0-.563-.456-1.021-1.018-1.021-.561 0-1.017.458-1.017 1.021 0 .564.456 1.021 1.017 1.021.562 0 1.018-.457 1.018-1.021z\"><\/path>     <path d=\"m41.719 31.642c0-.563-.456-1.02-1.018-1.02-.561 0-1.017.457-1.017 1.02 0 .564.456 1.021 1.017 1.021.562 0 1.018-.457 1.018-1.021z\"><\/path>     <path d=\"m35.613 28.58c0-.563-.455-1.021-1.017-1.021s-1.018.458-1.018 1.021c0 .564.456 1.021 1.018 1.021s1.017-.457 1.017-1.021z\"><\/path>     <path d=\"m37.649 31.642c0-.563-.456-1.02-1.018-1.02s-1.018.457-1.018 1.02c0 .564.456 1.021 1.018 1.021s1.018-.457 1.018-1.021z\"><\/path>     <path fill-rule=\"nonzero\" d=\"m10.684 6.124c-2.524 0-4.579 2.061-4.579 4.594 0 2.532 2.055 4.593 4.579 4.593 2.525 0 4.579-2.061 4.579-4.593 0-2.533-2.054-4.594-4.579-4.594zm0 7.145c-1.402 0-2.544-1.144-2.544-2.551 0-1.408 1.142-2.552 2.544-2.552s2.544 1.144 2.544 2.552c0 1.407-1.142 2.551-2.544 2.551z\"><\/path>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">Firewall<\/span><\/h2>\n\n\n\n<p>Compatible avec ...<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Palo Alto Networks<\/li>\n\n\n\n<li>Fortinet<\/li>\n\n\n\n<li>Check Point<\/li>\n\n\n\n<li>Cisco<\/li>\n\n\n\n<li>SonicWall<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-0cba5498\">\n\n<h2 class=\"gb-headline gb-headline-b90cc82f\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 62 43\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <path fill-rule=\"nonzero\" fill=\"#930cd3\" d=\"m55.316 20.68c-.081-5.837-4.854-10.561-10.71-10.561-1.321 0-2.632.247-3.857.72-.943-2.861-2.71-5.429-5.072-7.339-2.79-2.257-6.307-3.5-9.9-3.5-8.462 0-15.388 6.706-15.745 15.083-2.693.799-5.117 2.411-6.902 4.608-2.019 2.486-3.13 5.62-3.13 8.826 0 7.724 6.282 14.008 14.004 14.008h36.524c6.311 0 11.445-5.136 11.445-11.447 0-4.47-2.641-8.544-6.657-10.398zm-4.788 19.44h-36.524c-6.396 0-11.6-5.205-11.6-11.603 0-2.656.921-5.251 2.592-7.31 1.648-2.028 3.952-3.455 6.487-4.016.558-.124.951-.623.942-1.195l-.001-.04c-.001-.064-.002-.128-.002-.192 0-7.365 5.991-13.359 13.355-13.359 3.089 0 5.99 1.025 8.388 2.965 2.33 1.883 3.976 4.521 4.635 7.425.084.37.337.679.683.833.347.154.746.137 1.077-.049 1.232-.69 2.63-1.054 4.046-1.054 4.581 0 8.308 3.728 8.308 8.309 0 .167-.008.344-.021.559-.036.53.282 1.021.781 1.207 3.525 1.309 5.894 4.716 5.894 8.478 0 4.986-4.055 9.042-9.04 9.042z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Public Cloud<\/span><\/h2>\n\n\n\n<p>Compatible avec ...<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AWS<\/li>\n\n\n\n<li>Microsoft Azure<\/li>\n\n\n\n<li>Orca Security<\/li>\n\n\n\n<li>Google Cloud<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-ad4d4070\">\n\n<h2 class=\"gb-headline gb-headline-86cdc349\"><span class=\"gb-icon\"><svg xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 49 49\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <clippath id=\"a\">     <path d=\"m-1.71 49.169h50.88v-50.88h-50.88z\" clip-rule=\"nonzero\"><\/path>   <\/clippath>   <clippath id=\"b\">     <path d=\"m0 48.203h48.388v-48.203h-48.388z\" clip-rule=\"evenodd\"><\/path>   <\/clippath>   <g clip-path=\"url(#a)\">     <g clip-path=\"url(#b)\">       <path fill-rule=\"nonzero\" fill=\"#930cd3\" d=\"m24.193 0c-13.347 0-24.193 10.806-24.193 24.102s10.846 24.101 24.193 24.101c13.35 0 24.195-10.805 24.194-24.101 0-13.296-10.845-24.102-24.194-24.102zm0 2.41c12.041 0 21.775 9.697 21.775 21.692 0 5.662-2.187 10.794-5.746 14.653l-1.516-.485-2.036-.56-2.057-.475-2.079-.391-.302-.089-.264-.165-.214-.226-.151-.273-.071-.306.006-.306.085-.301.159-.269.512-.701.438-.744.738-1.468.653-1.502.571-1.54.488-1.573.395-1.584.312-1.611.222-1.629.137-1.633.042-1.639-.042-1.048-.141-1.047-.228-1.026-.32-1.002-.402-.97-.488-.936-.56-.886-.649-.833-.708-.776-.784-.707-.833-.64-.893-.569-.936-.486-.973-.399-1.006-.32-1.035-.227-1.044-.136-1.055-.047-1.052.047-1.044.136-1.037.227-1.006.32-.974.399-.935.486-.888.569-.836.64-.785.707-.709.776-.642.833-.567.886-.487.936-.402.97-.321 1.002-.227 1.026-.137 1.047-.047 1.048.043 1.639.137 1.633.222 1.629.312 1.611.397 1.584.486 1.573.577 1.54.647 1.502.737 1.468.44.744.51.701.161.269.085.301.009.306-.075.306-.152.273-.212.226-.265.165-.302.089-2.075.391-2.06.475-2.037.56-1.517.485c-3.557-3.859-5.746-8.991-5.746-14.653 0-11.995 9.735-21.692 21.774-21.692zm0 7.231.95.046.942.142.917.229.891.316.865.409.815.481.76.566.707.635.633.701.569.763.486.809.407.858.321.89.232.917.141.936.042.946-.036 1.513-.129 1.5-.208 1.492-.282 1.483-.369 1.464-.45 1.446-.524 1.412-.601 1.388-.675 1.351-.331.551-.383.532-.316.476-.24.522-.158.556-.066.574.034.574.117.565.21.537.292.503.369.443.429.386.486.306.541.226.556.136 1.976.372 1.966.452 1.937.532.24.075c-3.792 3.202-8.691 5.141-14.063 5.141-5.369 0-10.268-1.939-14.062-5.141l.241-.075 1.938-.532 1.965-.452 1.976-.372.557-.136.539-.226.487-.306.435-.386.364-.443.292-.503.214-.537.113-.565.032-.574-.066-.574-.156-.556-.242-.522-.316-.476-.382-.532-.331-.551-.676-1.351-.6-1.388-.524-1.412-.449-1.446-.364-1.464-.288-1.483-.208-1.492-.128-1.5-.038-1.513.048-.946.141-.936.227-.917.321-.89.407-.858.487-.809.567-.763.633-.701.709-.635.76-.567.819-.48.859-.409.893-.316.917-.229.94-.142z\"><\/path>     <\/g>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">Identit\u00e9<\/span><\/h2>\n\n\n\n<p>Compatible avec ...<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Okta<\/li>\n\n\n\n<li>Duo<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-397ac017\">\n\n<h2 class=\"gb-headline gb-headline-df1f88f4\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 56 56\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <g fill-rule=\"nonzero\" fill=\"#930cd3\">     <path d=\"m18.56 17.001h4.426v3.085h-1.654c-.49 0-.888.398-.888.891s.398.892.888.892h12.397c.491 0 .888-.399.888-.892s-.397-.891-.888-.891h-1.654v-3.085h4.426c1.743 0 3.162-1.424 3.162-3.176v-10.65c0-1.751-1.419-3.175-3.162-3.175h-17.941c-1.743 0-3.161 1.424-3.161 3.175v10.65c0 1.752 1.418 3.176 3.161 3.176zm11.74 3.085h-5.538v-3.085h5.538zm-13.125-16.911c0-.767.622-1.392 1.385-1.392h17.941c.764 0 1.386.625 1.386 1.392v10.65c0 .767-.622 1.393-1.386 1.393h-17.941c-.763 0-1.385-.626-1.385-1.393z\"><\/path>     <path d=\"m21.102 33.425h-17.94c-1.743 0-3.162 1.424-3.162 3.176v10.649c0 1.751 1.419 3.176 3.162 3.176h4.426v3.085h-1.654c-.491 0-.888.399-.888.891 0 .493.397.892.888.892h12.396c.491 0 .888-.399.888-.892 0-.492-.397-.891-.888-.891h-1.653v-3.085h4.425c1.744 0 3.163-1.425 3.163-3.176v-10.649c0-1.752-1.419-3.176-3.163-3.176zm-6.201 20.086h-5.537v-3.085h5.537zm7.588-6.261c0 .768-.622 1.392-1.387 1.392h-17.94c-.764 0-1.386-.624-1.386-1.392v-10.649c0-.768.622-1.392 1.386-1.392h17.94c.765 0 1.387.624 1.387 1.392z\"><\/path>     <path d=\"m51.899 33.425h-17.94c-1.744 0-3.162 1.424-3.162 3.176v10.649c0 1.751 1.418 3.176 3.162 3.176h4.425v3.085h-1.653c-.491 0-.888.399-.888.891 0 .493.397.892.888.892h12.396c.492 0 .888-.399.888-.892 0-.492-.396-.891-.888-.891h-1.653v-3.085h4.425c1.744 0 3.163-1.425 3.163-3.176v-10.649c0-1.752-1.419-3.176-3.163-3.176zm-6.201 20.086h-5.537v-3.085h5.537zm7.588-6.261c0 .768-.622 1.392-1.387 1.392h-17.94c-.764 0-1.387-.624-1.387-1.392v-10.649c0-.768.623-1.392 1.387-1.392h17.94c.765 0 1.387.624 1.387 1.392z\"><\/path>     <path d=\"m42.041 30.749c0 .492.398.892.889.892.49 0 .888-.4.888-.892v-3.102c0-.493-.398-.892-.888-.892h-14.511v-2.21c0-.493-.398-.892-.888-.892s-.888.399-.888.892v2.21h-14.511c-.49 0-.888.399-.888.892v3.102c0 .492.398.892.888.892.491 0 .889-.4.889-.892v-2.21h29.02z\"><\/path>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">Network Security<\/span><\/h2>\n\n\n\n<p>Compatible avec ...<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Darktrace<\/li>\n\n\n\n<li>Forcepoint<\/li>\n\n\n\n<li>McAfee (passerelle web)<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-f6062022\">\n\n<h2 class=\"gb-headline gb-headline-8854c324\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 55 41\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <path fill-rule=\"nonzero\" fill=\"#930cd3\" d=\"m49.189 0h-44.101c-2.81 0-5.088 2.287-5.088 5.108v30.65c0 2.822 2.278 5.108 5.088 5.108h44.101c2.81 0 5.088-2.286 5.088-5.108v-30.65c0-2.821-2.278-5.108-5.088-5.108zm3.392 35.001-16.043-16.107 16.043-10.264zm-47.493-33.298h44.101c1.87 0 3.392 1.528 3.392 3.405v1.504l-23.35 14.939c-1.264.809-2.878.784-4.112-.059l-23.423-15.984v-.4c0-1.877 1.522-3.405 3.392-3.405zm-3.392 5.862 16.269 11.102-16.269 16.334v-27.436zm47.493 31.599h-44.101c-1.397 0-2.598-.853-3.117-2.067l17.4-17.47 4.796 3.272c.921.628 1.985.943 3.052.943 1.013 0 2.029-.284 2.922-.855l4.954-3.17 17.211 17.28c-.519 1.214-1.72 2.067-3.117 2.067z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Email<\/span><\/h2>\n\n\n\n<p>Compatible avec ...<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Proofpoint<\/li>\n\n\n\n<li>Mimecast<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-d4da5acf\">\n\n<h2 class=\"gb-headline gb-headline-77d7ec14\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 57 51\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <g fill-rule=\"nonzero\" fill=\"#0ca406\">     <path d=\"m46.691 13.509h-21.831v-2.119c0-1.589-.616-3.082-1.735-4.204-1.119-1.124-2.606-1.742-4.188-1.742h-15.01c-2.166 0-3.927 1.769-3.927 3.943v36.46c0 2.37 1.921 4.299 4.282 4.299h42.409c2.361 0 4.281-1.929 4.281-4.299v-28.04c0-2.37-1.92-4.298-4.281-4.298zm2.519 32.338c0 1.395-1.129 2.53-2.519 2.53h-42.409c-1.39 0-2.52-1.135-2.52-2.53v-36.46c0-1.199.972-2.174 2.165-2.174h15.01c1.112 0 2.156.434 2.942 1.223s1.219 1.838 1.219 2.954v3.004c0 .489.394.884.881.884h22.712c1.39 0 2.519 1.134 2.519 2.529z\"><\/path>     <path d=\"m52.112 8.065h-21.829v-2.117c0-1.588-.616-3.081-1.736-4.206-1.103-1.107-2.629-1.742-4.187-1.742h-15.01c-2.167 0-3.928 1.769-3.928 3.943 0 .489.394.884.881.884.488 0 .881-.395.881-.884 0-1.199.972-2.174 2.166-2.174h15.01c1.094 0 2.167.446 2.941 1.224.787.79 1.22 1.84 1.22 2.955v3.001c0 .49.394.885.881.885h22.71c1.389 0 2.52 1.135 2.52 2.531v28.04c0 1.394-1.131 2.528-2.52 2.528-.487 0-.881.396-.881.885s.394.884.881.884c2.361 0 4.282-1.928 4.282-4.297v-28.04c0-2.371-1.921-4.3-4.282-4.3z\"><\/path>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">R\u00e9tention des donn\u00e9es pendant 1 an<\/span><\/h2>\n\n\n\n<p>Stocke les donn\u00e9es de tous les produits Sophos et de tous les produits tiers (non-Sophos) dans le Sophos Data Lake.<\/p>\n\n<\/div>\n<\/div>\n\n<div data-block=\"hook:108308\" class=\"alignfull\"><article id=\"post-108308\" class=\"post-108308\"><div class=\"entry-content is-layout-constrained\">\n<style>.avanet-ct-container{overflow-x:auto}.avanet-ct-container tr>th:first-child,.avanet-ct-container tr>td:first-child{position:relative;background-color:#FFFFFF;font-size:.8rem}.avanet-ct-container table,.avanet-ct-container th,.avanet-ct-container td{border:0}.avanet-ct-header{position:relative;width:220px;min-height:360px;padding:40px 20px 20px;border-right:1px solid rgb(232,235,236);background-color:#fff;display:flex;flex-direction:column;align-items:center;justify-content:space-between}.avanet-ct-cell-title{font-size:1.2rem;line-height:1.2rem;color:#475569;margin-bottom:0rem!important}.avanet-ct-container td,.avanet-ct-container th{vertical-align:top}.avanet-ct-row td,.avanet-ct-row th{border-bottom:1px solid rgb(232,235,236)}.avanet-ct-row td:nth-child(n+2){border-right:1px solid rgb(232,235,236);background:rgb(255,255,255);padding:20px 20px;font-size:.8rem}.avanet-ct-row th:nth-child(n+2){padding:0}.avanet-ct-row td:first-child{padding:20px 20px 20px 0;font-weight:600;color:#475569}.avanet-ct-row td:last-child,.avanet-ct-row th:last-child{border-right:none}.avanet-ct-row th:last-child .avanet-ct-header{border-right:none}.avanet-ct-row:last-child td{border-bottom:none}.avanet-ct-selected-product{width:146px;height:34px;color:rgb(255,255,255);font-size:14px;display:flex;align-items:center;justify-content:center;background:#f59e0b;position:absolute;border-radius:2px;top:-1rem;left:50%;transform:translateX(-50%);text-transform:uppercase}.avanet-ct-cta-button{display:inline-block;padding:5px 30px;background-color:#f4f4f5;border-radius:2px;color:#a1a1aa;text-decoration:none!important;font-weight:600;text-transform:uppercase;font-size:.8rem}.avanet-ct-header img{margin-bottom:0rem}.avanet-ct-spacer{height:1rem;background-color:#FFFFFF}@media screen and (min-width:1200px){.avanet-ct-container table{table-layout:fixed}.avanet-ct-container tr>th:first-child,.avanet-ct-container tr>td:first-child{position:relative;font-size:.8rem;width:180px}.avanet-ct-header{width:100%}.avanet-ct-cta-button{padding:5px 20px;font-size:.6rem}}@media screen and (min-width:768px) and (max-width:1199px){.avanet-ct-container tr>th:first-child,.avanet-ct-container tr>td:first-child{position:sticky;left:0;z-index:1}}<\/style>\n\n<h2 class=\"gb-headline gb-headline-522654b5 gb-headline-text\">Sp\u00e9cifications techniques<\/h2>\n\n<p class=\"gb-headline gb-headline-2fcf27cb gb-headline-text\">Comparez les fonctionnalit\u00e9s des diff\u00e9rents <strong>produits Sophos pour syst\u00e8mes d'extr\u00e9mit\u00e9<\/strong> afin de prot\u00e9ger vos clients.\nVous ne savez pas quelle protection convient le mieux \u00e0 votre entreprise ?\nNous vous conseillons gratuitement et sans engagement.  <\/p>\n\n<div class=\"avanet-ct-container\" itemtype=\"http:\/\/schema.org\/Table\">\n  <table>\n    <thead>\n      <tr class=\"avanet-ct-row\">\n        <th><\/th>\n        <th>\n          <div class=\"avanet-ct-spacer\"><\/div>\n          <div class=\"avanet-ct-header\">\n            <p class=\"avanet-ct-cell-title\">Intercept X Essentials<\/p>\n            <img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-intercept-x-essentials-cover-600x600.png\" alt=\"Sophos Central Intercept X Essentials\"\/>\n            <a class=\"avanet-ct-cta-button\" href=\"https:\/\/www.avanet.com\/fr\/shop\/sophos-central-intercept-x-essentials\/\">\n Vers le produit\n            <\/a>\n          <\/div>\n        <\/th>\n        <th>\n          <div class=\"avanet-ct-spacer\"><\/div>\n          <div class=\"avanet-ct-header\">\n            <p class=\"avanet-ct-cell-title\">Intercept X Advanced<\/p>\n            <img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-intercept-x-advanced-cover-600x600.png\" alt=\"Sophos Central Intercept X Advanced\"\/>\n            <a class=\"avanet-ct-cta-button\" href=\"https:\/\/www.avanet.com\/fr\/shop\/sophos-central-intercept-x-advanced\/\">\n Vers le produit\n            <\/a>\n          <\/div>\n        <\/th>\n        <th>\n          <div class=\"avanet-ct-spacer\"><\/div>\n          <div class=\"avanet-ct-header\">\n            <p class=\"avanet-ct-cell-title\">Intercept X Advanced avec XDR<\/p>\n            <img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-intercept-x-advanced-with-xdr-cover-600x600.png\" alt=\"Sophos Central Intercept X Advanced avec XDR\"\/>\n            <a class=\"avanet-ct-cta-button\" href=\"https:\/\/www.avanet.com\/fr\/shop\/sophos-central-intercept-x-advanced-avec-xdr\/\">\n Vers le produit\n            <\/a>\n          <\/div>\n        <\/th>\n        <th>\n          <div class=\"avanet-ct-spacer\"><\/div>\n          <div class=\"avanet-ct-header\">\n            <p class=\"avanet-ct-cell-title\">Sophos MDR Essentials<\/p>\n            <img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-managed-detection-and-response-cover-600x600.png\" alt=\"D\u00e9tection et r\u00e9ponse g\u00e9r\u00e9es Sophos\"\/>\n            <a class=\"avanet-ct-cta-button\" href=\"https:\/\/www.avanet.com\/fr\/shop\/sophos-central-managed-detection-and-response\/\">\n Vers le produit\n            <\/a>\n          <\/div>\n        <\/th>\n        <th>\n          <div class=\"avanet-ct-spacer\"><\/div>\n          <div class=\"avanet-ct-header\">\n            <span class=\"avanet-ct-selected-product\">Recommand\u00e9<\/span>\n            <p class=\"avanet-ct-cell-title\">Sophos MDR Complete<\/p>\n            <img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-managed-detection-and-response-complete-cover-600x600.png\" alt=\"Sophos Managed Detection and Response Complete\"\/>\n            <a class=\"avanet-ct-cta-button\" href=\"https:\/\/www.avanet.com\/fr\/shop\/sophos-central-managed-detection-and-response-complete\/\">\n Vers le produit\n            <\/a>\n          <\/div>\n        <\/th>\n      <\/tr>\n    <\/thead>\n    <tbody>\n      <!-- ROWS -->\n      <tr class=\"avanet-ct-row\">\n        <td>Plusieurs directives<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Mises \u00e0 jour contr\u00f4l\u00e9es<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Contr\u00f4le des applications<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Contr\u00f4le de la p\u00e9riph\u00e9rie<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Contr\u00f4le web\/filtrage des URL par cat\u00e9gorie<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>T\u00e9l\u00e9charger la r\u00e9putation<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>S\u00e9curit\u00e9 du web<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>D\u00e9tection de logiciels malveillants par apprentissage en profondeur<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Disques de fichiers anti-malware<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Protection en direct<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Analyses comportementales avant ex\u00e9cution (HIPS)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Blocage des applications pot.\napplications ind\u00e9sirables (PUA) <\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Syst\u00e8me de pr\u00e9vention des intrusions (IPS)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Pr\u00e9vention de la perte de donn\u00e9es<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Analyse du comportement en temps r\u00e9el (HIPS)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Interface d'analyse antimalware (AMSI)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>D\u00e9tection de trafic malveillant (MTD)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Pr\u00e9vention des exploits<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Active Adversary Mitigations<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Protection des fichiers contre les ransomwares (CryptoGuard)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Protection du disque et de l'enregistrement de d\u00e9marrage (WipeGuard)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Protection de l'homme dans le navigateur (Safe Browsing)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Am\u00e9lioration du verrouillage des applications<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n  Live Discover (requ\u00eates SQL inter-environnementales pour la recherche de menaces)\n et de conformit\u00e9 \u00e0 la s\u00e9curit\u00e9)\n \n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n  Biblioth\u00e8que de requ\u00eates SQL (requ\u00eates pr\u00e9formul\u00e9es et personnalisables)\n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n  Stockage des donn\u00e9es sur disque dur (jusqu'\u00e0 90 jours) avec acc\u00e8s rapide aux donn\u00e9es\n Acc\u00e8s aux donn\u00e9es\n \n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Sources de donn\u00e9es inter-produits (p. ex. pare-feu, e-mail)<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Requ\u00eates inter-produits<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Sophos Data Lake (stockage de donn\u00e9es en nuage)<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>30 jours<\/td>\n        <td>90 jours<\/td>\n        <td>90 jours<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Requ\u00eates planifi\u00e9es<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Cas de menaces (analyse des causes)<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Analyse des logiciels malveillants par apprentissage en profondeur<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Donn\u00e9es avanc\u00e9es sur les menaces provenant des SophosLabs \u00e0 la demande<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Exportation de donn\u00e9es m\u00e9dico-l\u00e9gales<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Suppression automatis\u00e9e des logiciels malveillants<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Battement de c\u0153ur de s\u00e9curit\u00e9 synchronis\u00e9<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Sophos Clean<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n Live Response (acc\u00e8s \u00e0 distance au terminal pour des analyses et des analyses compl\u00e9mentaires) mesures de r\u00e9action)\n \n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Isolation d'extr\u00e9mit\u00e9 \u00e0 la demande<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>En cliquant sur \"Supprimer et bloquer\".<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Recherche de menaces bas\u00e9e sur des indices 24h\/24 et 7j\/7<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Compatible avec les outils de s\u00e9curit\u00e9 d'autres fabricants<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Contr\u00f4les de sant\u00e9 en mati\u00e8re de s\u00e9curit\u00e9<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Rapports d'activit\u00e9<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Sophos MDR ThreatCast<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>D\u00e9tection des attaques<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Stopper et endiguer les menaces<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Assistance t\u00e9l\u00e9phonique directe en cas d'incident<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Recherche de menaces sans indices 24h\/24 et 7j\/7<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Gestion proactive de la posture de s\u00e9curit\u00e9<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n R\u00e9ponse compl\u00e8te aux incidents : neutralisation compl\u00e8te des menaces\n \n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n Analyse des causes - et comment pr\u00e9venir de nouvelles attaques ?\n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Interlocuteur d\u00e9di\u00e9 aupr\u00e8s de l'\u00e9quipe de r\u00e9ponse aux incidents<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/div>\n<\/div><\/article><\/div>\n\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-9133b606 ava-card-spacer\" id=\"avanet-services\">\n<div class=\"gb-container gb-container-62905ae0\">\n\n<h2 class=\"gb-headline gb-headline-8d5720e2\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 20 20\" fill=\"currentColor\" class=\"w-5 h-5\">   <path fill-rule=\"evenodd\" d=\"M9.661 2.237a.531.531 0 01.678 0 11.947 11.947 0 007.078 2.749.5.5 0 01.479.425c.069.52.104 1.05.104 1.59 0 5.162-3.26 9.563-7.834 11.256a.48.48 0 01-.332 0C5.26 16.564 2 12.163 2 7c0-.538.035-1.069.104-1.589a.5.5 0 01.48-.425 11.947 11.947 0 007.077-2.75zm4.196 5.954a.75.75 0 00-1.214-.882l-3.483 4.79-1.88-1.88a.75.75 0 10-1.06 1.061l2.5 2.5a.75.75 0 001.137-.089l4-5.5z\" clip-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Avanet Services<\/span><\/h2>\n\n\n\n<h2 class=\"gb-headline gb-headline-c000922f gb-headline-text\"><strong>Am\u00e9liorons<\/strong> votre s\u00e9curit\u00e9<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-85bf1781 gb-headline-text\">Nos services sont con\u00e7us pour vous aider \u00e0 faire fonctionner vos produits Sophos de mani\u00e8re s\u00fbre et fiable. En plus du support classique pour les pare-feux Sophos ou la plate-forme centrale, nous proposons les services suivants, qui peuvent \u00eatre demand\u00e9s \u00e0 tout moment :<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-37947fc7\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Services de configuration<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-a5890901\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Bilan de sant\u00e9<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-469c99da\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Mises \u00e0 niveau<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-23394641\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Ateliers<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-bf0d08bf\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Migrations<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-0a3902cc\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Maintenance du pare-feu<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-9b54ea89\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">SLA<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-d867028f\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Audits de s\u00e9curit\u00e9<\/span><\/p>\n\n\n\n<a class=\"gb-button gb-button-a1b7de4e gb-button-text\" href=\"https:\/\/www.avanet.com\/fr\/contact\/\">Demander plus d'informations<\/a>\n\n<\/div>\n\n<div class=\"gb-container gb-container-7499e21c\">\n<div class=\"gb-container gb-container-5c65e230\">\n\n<h2 class=\"gb-headline gb-headline-87d289ed\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewbox=\"0 0 34 44\"><path d=\"m1.299.002c-.738.077-1.303.708-1.299 1.45v40.601c0 .795.655 1.45 1.45 1.45h30.934c.796 0 1.45-.655 1.45-1.45v-26.101c0-.006 0-.013 0-.02 0-.796-.654-1.45-1.45-1.45-.795 0-1.45.654-1.45 1.45v.02 24.651h-28.034v-37.701h18.367v8.217c0 .795.655 1.45 1.45 1.45h9.667.003c.796 0 1.451-.655 1.451-1.45 0-.385-.154-.755-.427-1.027l-9.667-9.667c-.272-.272-.642-.424-1.027-.423h-21.267c-.05-.003-.101-.003-.151 0zm22.868 4.939 4.728 4.728h-4.728zm-4.833 9.561c-3.72 0-6.767 3.047-6.767 6.767 0 1.031.294 1.978.71 2.855-.143.278-.311.617-.544 1.057-.527.996-1.25 2.317-1.963 3.64-1.428 2.647-2.855 5.287-2.855 5.287-.382.692-.13 1.576.559 1.964l4.35 2.416c.215.12.458.183.705.183.53 0 1.02-.291 1.273-.757l5.438-9.969c3.292-.45 5.861-3.266 5.861-6.676 0-3.72-3.047-6.767-6.767-6.767zm0 2.9c.192 0 .375.019.559.046-.308.588-.708 1.34-1.178 2.205-.151.234-.231.506-.231.784 0 .796.655 1.451 1.45 1.451.566 0 1.082-.331 1.318-.845.451-.829.832-1.541 1.148-2.145.504.653.801 1.473.801 2.371 0 2.153-1.714 3.867-3.867 3.867-.528.001-1.016.291-1.269.755l-5.105 9.35-1.813-1.012c.461-.848 1.087-2.016 2.175-4.033.716-1.327 1.43-2.646 1.964-3.655.267-.505.491-.928.649-1.239.079-.155.145-.284.197-.393.025-.054.046-.108.075-.181.015-.036.033-.072.061-.166.013-.047.029-.094.045-.227.008-.066.012-.158 0-.302-.012-.143-.226-.664-.227-.664-.393-.607-.619-1.321-.619-2.1 0-2.153 1.714-3.867 3.867-3.867z\" fill-rule=\"nonzero\"><\/path><\/svg><\/span><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-c8e59303 gb-headline-text\">Services de configuration<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-849d50d0 gb-headline-text\">Vous souhaitez confier l'installation de vos produits Sophos \u00e0 des professionnels ? Nous vous assistons lors de la mise en service et de la configuration pour un fonctionnement sans faille.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-919c66aa\">\n\n<h2 class=\"gb-headline gb-headline-b70595a3\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewbox=\"0 0 33 43\"><g fill-rule=\"nonzero\"><path d=\"m7.81 17.518c.327.327.763.509 1.235.509s.872-.182 1.235-.509c.69-.69.69-1.78 0-2.434l-4.359-4.322h24.411c.945 0 1.744-.763 1.744-1.744s-.763-1.744-1.744-1.744h-24.411l4.323-4.323c.69-.69.69-1.779 0-2.433-.69-.691-1.78-.691-2.434 0l-7.265 7.265c-.69.69-.69 1.78 0 2.434z\"><\/path><path d=\"m24.302 24.51c-.69-.691-1.78-.691-2.434 0-.69.69-.69 1.78 0 2.433l4.323 4.323h-24.447c-.945 0-1.744.763-1.744 1.744 0 .944.763 1.744 1.744 1.744h24.411l-4.323 4.322c-.69.691-.69 1.78 0 2.434.327.327.763.509 1.235.509s.872-.182 1.235-.509l7.265-7.301c.69-.691.69-1.78 0-2.434z\"><\/path><\/g><\/svg><\/span><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-a5c7ecbc gb-headline-text\">Migrations<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-99426999 gb-headline-text\">Vous souhaitez passer de votre pare-feu SG (UTM) \u00e0 un pare-feu XGS avec le syst\u00e8me d'exploitation SFOS ? Gr\u00e2ce \u00e0 notre exp\u00e9rience, nous pouvons r\u00e9aliser votre transition sans probl\u00e8me.<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-547ef5b2\">\n<div class=\"gb-container gb-container-fe09310a\">\n\n<h2 class=\"gb-headline gb-headline-bd3b1646\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewbox=\"0 0 39 46\"><g><circle cx=\"6.354\" cy=\"6.354\" r=\"1.271\"><\/circle><circle cx=\"31.771\" cy=\"6.354\" r=\"1.271\"><\/circle><circle cx=\"31.771\" cy=\"34.313\" r=\"1.271\"><\/circle><circle cx=\"6.354\" cy=\"34.313\" r=\"1.271\"><\/circle><g fill-rule=\"nonzero\"><path d=\"m19.063 10.167c-5.606 0-10.167 4.56-10.167 10.166s4.561 10.167 10.167 10.167c5.605 0 10.166-4.561 10.166-10.167s-4.561-10.166-10.166-10.166zm-.854 14.505-4.493-4.493 1.797-1.797 2.696 2.696 4.493-4.493 1.797 1.797z\"><\/path><path d=\"m34.313 0h-30.501c-2.102 0-3.812 1.71-3.812 3.813v38.125c0 2.102 1.71 3.812 3.812 3.812h30.501c2.102 0 3.812-1.71 3.812-3.812v-38.126c0-2.102-1.71-3.812-3.812-3.812zm-24.146 43.208h-6.355c-.7 0-1.27-.57-1.27-1.27v-1.494c.398.142.824.223 1.27.223h6.355zm3.812 0h-1.271v-2.541h1.271zm3.813 0h-1.271v-2.541h1.271zm3.812 0h-1.271v-2.541h1.271zm3.813 0h-1.271v-2.541h1.271zm10.166-1.27c0 .7-.57 1.27-1.27 1.27h-6.355v-2.541h6.355c.446 0 .872-.081 1.27-.223zm0-38.126v33.042c0 .701-.57 1.271-1.27 1.271h-30.501c-.7 0-1.27-.57-1.27-1.271v-33.042c0-.7.57-1.27 1.27-1.27h30.501c.7 0 1.27.57 1.27 1.27z\"><\/path><\/g><\/g><\/svg><\/span><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-b2a78fde gb-headline-text\">Bilan de sant\u00e9<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-d7a0b735 gb-headline-text\">Vous avez configur\u00e9 vos produits Sophos vous-m\u00eame et vous souhaitez que nous v\u00e9rifiions la configuration ? Nous v\u00e9rifions vos param\u00e8tres et vous donnons notre recommandation.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-9fe28494\">\n\n<h2 class=\"gb-headline gb-headline-aedf3cc2\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewbox=\"0 0 49 60\"><path d=\"m22.586 4.304v-2.805c0-.822.677-1.499 1.499-1.499.823 0 1.499.677 1.499 1.499v2.805h21.087.007c.819.015 1.482.698 1.473 1.513v33.066c0 .822-.677 1.499-1.499 1.499h-14.283l7.015 14.711c.103.208.156.436.156.668 0 .822-.676 1.499-1.499 1.499-.586 0-1.122-.345-1.362-.873l-7.614-16.005h-3.481v17.668c0 .823-.676 1.499-1.499 1.499-.822 0-1.499-.676-1.499-1.499v-17.668h-3.488l-7.624 15.972c-.241.533-.773.878-1.36.881-.221 0-.439-.048-.644-.142-.52-.249-.853-.776-.853-1.353 0-.224.05-.446.147-.648l7.017-14.717h-14.282c-.822 0-1.499-.677-1.499-1.499v-33.073c0-.822.677-1.499 1.499-1.499zm-19.588 2.998v30.062h42.174v-30.062zm17.121 13.135c-.879-.961-1.374-2.223-1.374-3.54 0-2.879 2.369-5.248 5.248-5.248s5.248 2.369 5.248 5.248c0 1.317-.496 2.579-1.374 3.54 3.86 1.452 3.899 5.554 3.886 7.305v3.385c0 .822-.677 1.499-1.499 1.499h-12.523c-.822 0-1.499-.677-1.499-1.499v-3.385c0-1.753.048-5.852 3.887-7.305zm8.632 9.191-.022-1.886c0-1.884-.191-3.262-1.128-4.053-.619-.521-1.551-.769-2.921-.769h-1.421c-1.373 0-2.307.248-2.926.77-.938.79-1.129 2.168-1.129 4.052v1.886zm-4.758-14.973c-1.246 0-2.27 1.024-2.27 2.27 0 1.245 1.024 2.269 2.27 2.269h.014c1.239-.008 2.255-1.029 2.255-2.269 0-1.241-1.016-2.262-2.255-2.27z\" fill-rule=\"nonzero\"><\/path><\/svg><\/span><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-9fce7ef8 gb-headline-text\">Ateliers<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-fc658173 gb-headline-text\">Votre travail consiste-t-il \u00e0 conna\u00eetre les produits Sophos dans votre entreprise ? Nous vous proposons un entra\u00eenement cibl\u00e9, enti\u00e8rement adapt\u00e9 \u00e0 vos besoins.<\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-a7fa59d1 ava-card-zero-margin\" id=\"info-materials\">\n<div class=\"gb-container gb-container-8aeebd39\">\n\n<p class=\"gb-headline gb-headline-8b3709cd\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M4.125 3C3.089 3 2.25 3.84 2.25 4.875V18a3 3 0 003 3h15a3 3 0 01-3-3V4.875C17.25 3.839 16.41 3 15.375 3H4.125zM12 9.75a.75.75 0 000 1.5h1.5a.75.75 0 000-1.5H12zm-.75-2.25a.75.75 0 01.75-.75h1.5a.75.75 0 010 1.5H12a.75.75 0 01-.75-.75zM6 12.75a.75.75 0 000 1.5h7.5a.75.75 0 000-1.5H6zm-.75 3.75a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5H6a.75.75 0 01-.75-.75zM6 6.75a.75.75 0 00-.75.75v3c0 .414.336.75.75.75h3a.75.75 0 00.75-.75v-3A.75.75 0 009 6.75H6z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M18.75 6.75h1.875c.621 0 1.125.504 1.125 1.125V18a1.5 1.5 0 01-3 0V6.75z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Mat\u00e9riel d'information<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-ae48c488 gb-headline-text\"><strong>Approfondissez<\/strong> vos connaissances et apprenez-en plus sur \u00ab Sophos Central Endpoint Protection \u00bb<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-bc37bd7b\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-central-fr.pdf\">Sophos Central \u2013 Fiche de donn\u00e9es<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-85a1944c\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-managed-detection-and-response-ds-fr.pdf\">Sophos Managed Detection and Response (MDR) \u2013 Fiche de donn\u00e9es<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-fb499f6c\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-managed-detection-and-response-br-fr.pdf\">Brochure des solutions Sophos Managed Detection and Response (MDR)<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-c1c993ca\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-mdr-services-buyers-guide-fr.pdf\">Sophos Managed Detection and Response (MDR) \u2013 Guide d'achat<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-42159a0b\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-mdr-breach-protection-warranty-ds-fr.pdf\">Sophos Breach Protection Warranty \u2013 Fiche de donn\u00e9es<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-7204cb0e\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-rapid-response-ds-fr.pdf\">Sophos Rapid Response \u2013 Fiche de donn\u00e9es<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-8a0162a8\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-xdr-beginner-guide-fr.pdf\">Extended Detection and Response (XDR) \u2013 Guide pour d\u00e9butants<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-489e1c67\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-xdr-licensing-guide-en.pdf\">Sophos XDR \u2013 Guide des licences<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-6272d76b\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-xdr-use-cases-en.pdf\">Sophos XDR \u2013 Cas d'utilisation<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-07e816fa\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-network-detection-and-response-ds-en.pdf\">Sophos Network Detection and Response (NDR) \u2013 Fiche de donn\u00e9es<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-1f137b06\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-network-detection-and-response-deskaid-fr.pdf\">Sophos Network Detection and Response (NDR) \u2013 Br\u00e8ve description<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-d7c98875\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-endpoint-buyers-guide-en.pdf\">Sophos Endpoint Security \u2013 Guide d'achat<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-ffb77489\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-security-cybersecurity-system-en.pdf\">Cybersecurity System \u2013 Guide d'achat<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-023feebb\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-en.pdf\">Sophos Intercept X \u2013 Fiche de donn\u00e9es<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-7a7c7b98\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-for-server-en.pdf\">Sophos Intercept X \u2013 Br\u00e8ve description<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-385de979\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-for-mac-fr.pdf\">Sophos Intercept X pour macOS<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-19ae20bb\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-deep-learning-en.pdf\">Sophos Intercept X Deep Learning<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-f2fcb6b2\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-essentials-faq-fr.pdf\">FAQ Intercept X Essentials et Intercept X Essentials for Server<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-621f9a29\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-endpoint-license-guide-en.pdf\">Pr\u00e9sentation des fonctionnalit\u00e9s de Sophos Intercept X, XDR et MTR<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-cf221c9f\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/support.sophos.com\/support\/s\/article\/KB-000035144?language=en_US\" target=\"_blank\" data-type=\"URL\" rel=\"noreferrer noopener nofollow\">Sophos Central Windows Endpoint : Configuration requise<\/a><\/span><\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-7346e745\">\n\n<figure class=\"gb-block-image gb-block-image-b8173d28\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"1074\" class=\"gb-image gb-image-b8173d28\" src=\"https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection.png\" alt=\"Info Materials Sophos Central Endpoint and Server Protection Hero Image\" title=\"sophos-assets-central-endpoint-and-server-protection\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection.png 1280w, https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection-64x54.png 64w, https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection-300x252.png 300w, https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection-1024x859.png 1024w, https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection-768x644.png 768w, https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection-600x503.png 600w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-7c6db709 ava-card-zero-margin ava-card-spacer\">\n<div class=\"gb-container gb-container-71364037\" id=\"education-government\">\n\n<p class=\"gb-headline gb-headline-61672cc7\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M9.674 2.075a.75.75 0 01.652 0l7.25 3.5A.75.75 0 0117 6.957V16.5h.25a.75.75 0 010 1.5H2.75a.75.75 0 010-1.5H3V6.957a.75.75 0 01-.576-1.382l7.25-3.5zM11 6a1 1 0 11-2 0 1 1 0 012 0zM7.5 9.75a.75.75 0 00-1.5 0v5.5a.75.75 0 001.5 0v-5.5zm3.25 0a.75.75 0 00-1.5 0v5.5a.75.75 0 001.5 0v-5.5zm3.25 0a.75.75 0 00-1.5 0v5.5a.75.75 0 001.5 0v-5.5z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">\u00c9DUCATION &amp; GOUVERNEMENT<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-ec41806a gb-headline-text\">Prix sp\u00e9ciaux pour les institutions \u00e9ducatives et gouvernementales<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-9b651157 gb-headline-text\">Sophos propose des remises sp\u00e9ciales pour les \u00e9coles et les institutions gouvernementales afin de r\u00e9pondre \u00e0 leurs exigences budg\u00e9taires particuli\u00e8res. On peut compter sur un rabais d'au moins <strong>20&nbsp; %<\/strong>*.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-7dc152d1 gb-headline-text\">Demandez-nous et nous vous ferons une offre gratuite et sans engagement.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-896d83be gb-headline-text\">* Les prix sp\u00e9ciaux pour les institutions \u00e9ducatives et gouvernementales ne sont disponibles que dans la r\u00e9gion DACH.<\/p>\n\n\n\n<a class=\"gb-button gb-button-27b36d7e gb-button-text\" href=\"https:\/\/www.avanet.com\/fr\/contact\/\">Demander des prix sp\u00e9ciaux<\/a>\n\n<\/div>\n\n<div class=\"gb-container gb-container-0ee14872\" id=\"trial-version\">\n\n<p class=\"gb-headline gb-headline-e79d319c\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M10 1a.75.75 0 01.75.75v1.5a.75.75 0 01-1.5 0v-1.5A.75.75 0 0110 1zM5.05 3.05a.75.75 0 011.06 0l1.062 1.06A.75.75 0 116.11 5.173L5.05 4.11a.75.75 0 010-1.06zm9.9 0a.75.75 0 010 1.06l-1.06 1.062a.75.75 0 01-1.062-1.061l1.061-1.06a.75.75 0 011.06 0zM3 8a.75.75 0 01.75-.75h1.5a.75.75 0 010 1.5h-1.5A.75.75 0 013 8zm11 0a.75.75 0 01.75-.75h1.5a.75.75 0 010 1.5h-1.5A.75.75 0 0114 8zm-6.828 2.828a.75.75 0 010 1.061L6.11 12.95a.75.75 0 01-1.06-1.06l1.06-1.06a.75.75 0 011.06 0zm3.594-3.317a.75.75 0 00-1.37.364l-.492 6.861a.75.75 0 001.204.65l1.043-.799.985 3.678a.75.75 0 001.45-.388l-.978-3.646 1.292.204a.75.75 0 00.74-1.16l-3.874-5.764z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Version d'essai<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-7d901e07 gb-headline-text\">Essayer Sophos Central <strong>gratuitement<\/strong> <\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-50c18159 gb-headline-text\">Essayez gratuitement <strong>pendant 30 jours<\/strong> la puissante plate-forme de gestion centralis\u00e9e de la s\u00e9curit\u00e9.  <\/p>\n\n\n\n<p class=\"gb-headline gb-headline-dbbe2354\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"size-4\" fill=\"currentColor\" viewbox=\"0 0 16 16\">   <path clip-rule=\"evenodd\" d=\"M8 15A7 7 0 1 0 8 1a7 7 0 0 0 0 14Zm3.844-8.791a.75.75 0 0 0-1.188-.918l-3.7 4.79-1.649-1.833a.75.75 0 1 0-1.114 1.004l2.25 2.5a.75.75 0 0 0 1.15-.043l4.25-5.5Z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><strong>Tous les produits<\/strong> - Testez l'ensemble complet de protection, y compris la protection XDR pour les postes clients, la messagerie \u00e9lectronique, les appareils mobiles et les serveurs.<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-fae0bf75\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"size-4\" fill=\"currentColor\" viewbox=\"0 0 16 16\">   <path clip-rule=\"evenodd\" d=\"M8 15A7 7 0 1 0 8 1a7 7 0 0 0 0 14Zm3.844-8.791a.75.75 0 0 0-1.188-.918l-3.7 4.79-1.649-1.833a.75.75 0 1 0-1.114 1.004l2.25 2.5a.75.75 0 0 0 1.15-.043l4.25-5.5Z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><strong>Une seule console<\/strong> - travaillez efficacement en g\u00e9rant tous les produits Sophos \u00e0 partir d'une seule plateforme cloud.<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-47c98d5f\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"size-4\" fill=\"currentColor\" viewbox=\"0 0 16 16\">   <path clip-rule=\"evenodd\" d=\"M8 15A7 7 0 1 0 8 1a7 7 0 0 0 0 14Zm3.844-8.791a.75.75 0 0 0-1.188-.918l-3.7 4.79-1.649-1.833a.75.75 0 1 0-1.114 1.004l2.25 2.5a.75.75 0 0 0 1.15-.043l4.25-5.5Z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><strong>Acc\u00e8s imm\u00e9diat<\/strong> - pr\u00eat \u00e0 l'emploi en quelques minutes.<\/span><\/p>\n\n\n<div class=\"gb-container gb-container-2f4b592c\">\n\n<a class=\"gb-button gb-button-3879b29b gb-button-text\" href=\"https:\/\/cloud.sophos.com\/manage\/login\" target=\"_blank\" rel=\"noopener\">D\u00e9monstration en ligne<\/a>\n\n\n\n<a class=\"gb-button gb-button-4dfceed4\" href=\"https:\/\/www.sophos.com\/fr-fr\/products\/sophos-central\/free-trial?id=0013000001EjyeY\" target=\"_blank\" rel=\"noopener\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path d=\"M10.75 2.75a.75.75 0 00-1.5 0v8.614L6.295 8.235a.75.75 0 10-1.09 1.03l4.25 4.5a.75.75 0 001.09 0l4.25-4.5a.75.75 0 00-1.09-1.03l-2.955 3.129V2.75z\"><\/path>   <path d=\"M3.5 12.75a.75.75 0 00-1.5 0v2.5A2.75 2.75 0 004.75 18h10.5A2.75 2.75 0 0018 15.25v-2.5a.75.75 0 00-1.5 0v2.5c0 .69-.56 1.25-1.25 1.25H4.75c-.69 0-1.25-.56-1.25-1.25v-2.5z\"><\/path> <\/svg><\/span><span class=\"gb-button-text\">Ouvrir un compte gratuit<\/span><\/a>\n\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-6c30642c gb-headline-text\">Utilisez les informations de connexion suivantes pour d\u00e9marrer votre d\u00e9mo en ligne. <strong>Nom d'utilisateur<\/strong>: demo@sophos.com \/ <strong>Mot de passe<\/strong>: Demo@sophos.com<\/p>\n\n<\/div>\n<\/div><div class=\"gb-container gb-container-6291cecc ava-card-spacer last\" id=\"help-for-buying\">\n\n<p class=\"gb-headline gb-headline-04e182da\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 20 20\" fill=\"currentColor\" class=\"w-5 h-5\">   <path d=\"M3.505 2.365A41.369 41.369 0 019 2c1.863 0 3.697.124 5.495.365 1.247.167 2.18 1.108 2.435 2.268a4.45 4.45 0 00-.577-.069 43.141 43.141 0 00-4.706 0C9.229 4.696 7.5 6.727 7.5 8.998v2.24c0 1.413.67 2.735 1.76 3.562l-2.98 2.98A.75.75 0 015 17.25v-3.443c-.501-.048-1-.106-1.495-.172C2.033 13.438 1 12.162 1 10.72V5.28c0-1.441 1.033-2.717 2.505-2.914z\"><\/path>   <path d=\"M14 6c-.762 0-1.52.02-2.271.062C10.157 6.148 9 7.472 9 8.998v2.24c0 1.519 1.147 2.839 2.71 2.935.214.013.428.024.642.034.2.009.385.09.518.224l2.35 2.35a.75.75 0 001.28-.531v-2.07c1.453-.195 2.5-1.463 2.5-2.915V8.998c0-1.526-1.157-2.85-2.729-2.936A41.645 41.645 0 0014 6z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Aide \u00e0 l'achat<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-a74d99bb gb-headline-text\">Vous avez encore <strong>des questions sur le produit<\/strong>?<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-c5a9534f gb-headline-text\">Mieux vaut se renseigner avant d'acheter, avant de se retrouver avec un mauvais produit entre les mains.<\/p>\n\n\n\n<a class=\"gb-button gb-button-7a0bb7da gb-button-text\" href=\"https:\/\/www.avanet.com\/fr\/contact\/\">Poser une question<\/a>\n\n<\/div><\/div><\/article><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":99135,"template":"","meta":{"_acf_changed":false},"product_brand":[],"product_cat":[597],"product_tag":[],"class_list":{"0":"post-88698","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-uncategorized","8":"first","9":"instock","10":"taxable","11":"shipping-taxable","12":"purchasable","13":"product-type-variable","14":"has-default-attributes"},"acf":[],"_links":{"self":[{"href":"https:\/\/www.avanet.com\/fr\/wp-json\/wp\/v2\/product\/88698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.avanet.com\/fr\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.avanet.com\/fr\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.avanet.com\/fr\/wp-json\/wp\/v2\/media\/99135"}],"wp:attachment":[{"href":"https:\/\/www.avanet.com\/fr\/wp-json\/wp\/v2\/media?parent=88698"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.avanet.com\/fr\/wp-json\/wp\/v2\/product_brand?post=88698"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.avanet.com\/fr\/wp-json\/wp\/v2\/product_cat?post=88698"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.avanet.com\/fr\/wp-json\/wp\/v2\/product_tag?post=88698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}