{"id":211,"date":"2021-11-04T15:45:17","date_gmt":"2021-11-04T14:45:17","guid":{"rendered":"https:\/\/luxidentity.lu\/?page_id=211"},"modified":"2021-11-17T17:33:55","modified_gmt":"2021-11-17T16:33:55","slug":"audit-de-failles-de-securite","status":"publish","type":"page","link":"https:\/\/luxidentity.lu\/index.php\/audit-de-failles-de-securite\/","title":{"rendered":"Audit de failles de s\u00e9curit\u00e9"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top:40px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-font-size:20px;--awb-text-color:#17a1dc;\"><p><strong>L'audit de failles de s\u00e9curit\u00e9 permet de d\u00e9celer de mani\u00e8re pr\u00e9ventive toutes les vuln\u00e9rabilit\u00e9s sur l'infrastructure informatique qui pourraient \u00eatre exploit\u00e9es par des hackers, des programmes malveillants dans le but de semer le chaos, de demander une ran\u00e7on, de proc\u00e9der \u00e0 de l'espionnage industriel, de voler des donn\u00e9es sensibles,\u2026<\/strong><\/p>\n<\/div><div class=\"fusion-text fusion-text-2\"><p>Cet audit est effectu\u00e9 \u00e0 partir de notre dispositif cr\u00e9\u00e9 par notre \u00e9quipe\u00a0: la DiscoveryBox.<\/p>\n<p>Ce dispositif est muni d'un logiciel qui scanne tout votre r\u00e9seau informatique, mais aussi vos sites web.<\/p>\n<p>Ce logiciel se met \u00e0 jour tous les jours sur la base de donn\u00e9es mondiale de d\u00e9couverte des vuln\u00e9rabilit\u00e9s techniques, logicielles, applicatives, syst\u00e8mes, d'\u00e9quipements,\u2026<\/p>\n<p>Suite \u00e0 cet audit, l'application des recommandations et des actions (pour le service IT) permet de r\u00e9duire de 90% la surface d'attaques (ou d'incidents) pour l'entreprise (Source ITrust.fr).<\/p>\n<p>Cet audit peut se faire de mani\u00e8re isol\u00e9e ou de mani\u00e8re continue toute l'ann\u00e9e pour une meilleure protection.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:20px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-padding-top:15px;--awb-padding-right:30px;--awb-padding-bottom:15px;--awb-padding-left:30px;--awb-overflow:hidden;--awb-bg-size:cover;--awb-box-shadow:0px 10px 51px 3px rgba(0,0,0,0.15);;--awb-border-color:#17a1dc;--awb-border-top:1px;--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:dotted;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.5px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:7.5px;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><h3><strong>Points forts<\/strong><\/h3>\n<ul>\n<li>Notre DiscoveryBox est Plug and Scan<\/li>\n<li>Nous offrons un service manag\u00e9 depuis nos bureaux, les audits sont automatis\u00e9s<\/li>\n<li>Vous recevez un \u00e9tat des lieux apr\u00e8s chaque scan avec les recommandations \u00e0 appliquer<\/li>\n<li>Vous r\u00e9duisez les risques d'intrusion<\/li>\n<li>Vous suivez les r\u00e8gles de mise en conformit\u00e9 existantes (RGPD,\u2026)<\/li>\n<li>Vous b\u00e9n\u00e9ficiez d'une solution non intrusive<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-padding-top:15px;--awb-padding-right:30px;--awb-padding-bottom:15px;--awb-padding-left:30px;--awb-overflow:hidden;--awb-bg-size:cover;--awb-box-shadow:0px 10px 51px 3px rgba(0,0,0,0.15);;--awb-border-color:#17a1dc;--awb-border-top:1px;--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:dotted;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.5px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:7.5px;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\"><h3><strong>Les b\u00e9n\u00e9fices inattendus pour vous et vos clients sont :\u00a0<\/strong><\/h3>\n<ul>\n<li>Faible exposition des risques informatiques<\/li>\n<li>Mise \u00e0 niveau de vos pratiques de s\u00e9curit\u00e9<\/li>\n<li>Faire chuter vos co\u00fbts op\u00e9rationnels<\/li>\n<li>Gagner du temps et \u00eatre en conformit\u00e9 r\u00e9glementaire<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-211","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Audit de failles de s\u00e9curit\u00e9 - Luxidentity<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/luxidentity.lu\/index.php\/audit-de-failles-de-securite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Audit de failles de s\u00e9curit\u00e9 - Luxidentity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/luxidentity.lu\/index.php\/audit-de-failles-de-securite\/\" \/>\n<meta property=\"og:site_name\" content=\"Luxidentity\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-17T16:33:55+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/luxidentity.lu\/index.php\/audit-de-failles-de-securite\/\",\"url\":\"https:\/\/luxidentity.lu\/index.php\/audit-de-failles-de-securite\/\",\"name\":\"Audit de failles de s\u00e9curit\u00e9 - Luxidentity\",\"isPartOf\":{\"@id\":\"https:\/\/luxidentity.lu\/#website\"},\"datePublished\":\"2021-11-04T14:45:17+00:00\",\"dateModified\":\"2021-11-17T16:33:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/luxidentity.lu\/index.php\/audit-de-failles-de-securite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/luxidentity.lu\/index.php\/audit-de-failles-de-securite\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/luxidentity.lu\/index.php\/audit-de-failles-de-securite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/luxidentity.lu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Audit de failles de s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/luxidentity.lu\/#website\",\"url\":\"https:\/\/luxidentity.lu\/\",\"name\":\"Luxidentity\",\"description\":\"Faites face aux Cyber menaces avec Luxidentity\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/luxidentity.lu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Audit de failles de s\u00e9curit\u00e9 - Luxidentity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/luxidentity.lu\/index.php\/audit-de-failles-de-securite\/","og_locale":"fr_FR","og_type":"article","og_title":"Audit de failles de s\u00e9curit\u00e9 - Luxidentity","og_url":"https:\/\/luxidentity.lu\/index.php\/audit-de-failles-de-securite\/","og_site_name":"Luxidentity","article_modified_time":"2021-11-17T16:33:55+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/luxidentity.lu\/index.php\/audit-de-failles-de-securite\/","url":"https:\/\/luxidentity.lu\/index.php\/audit-de-failles-de-securite\/","name":"Audit de failles de s\u00e9curit\u00e9 - Luxidentity","isPartOf":{"@id":"https:\/\/luxidentity.lu\/#website"},"datePublished":"2021-11-04T14:45:17+00:00","dateModified":"2021-11-17T16:33:55+00:00","breadcrumb":{"@id":"https:\/\/luxidentity.lu\/index.php\/audit-de-failles-de-securite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/luxidentity.lu\/index.php\/audit-de-failles-de-securite\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/luxidentity.lu\/index.php\/audit-de-failles-de-securite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/luxidentity.lu\/"},{"@type":"ListItem","position":2,"name":"Audit de failles de s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/luxidentity.lu\/#website","url":"https:\/\/luxidentity.lu\/","name":"Luxidentity","description":"Faites face aux Cyber menaces avec Luxidentity","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/luxidentity.lu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/luxidentity.lu\/index.php\/wp-json\/wp\/v2\/pages\/211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/luxidentity.lu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/luxidentity.lu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/luxidentity.lu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/luxidentity.lu\/index.php\/wp-json\/wp\/v2\/comments?post=211"}],"version-history":[{"count":14,"href":"https:\/\/luxidentity.lu\/index.php\/wp-json\/wp\/v2\/pages\/211\/revisions"}],"predecessor-version":[{"id":286,"href":"https:\/\/luxidentity.lu\/index.php\/wp-json\/wp\/v2\/pages\/211\/revisions\/286"}],"wp:attachment":[{"href":"https:\/\/luxidentity.lu\/index.php\/wp-json\/wp\/v2\/media?parent=211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}