{"id":497591,"date":"2024-02-29T16:53:03","date_gmt":"2024-02-29T15:53:03","guid":{"rendered":"https:\/\/www.stormshield.com\/?page_id=497591"},"modified":"2025-05-06T13:12:28","modified_gmt":"2025-05-06T12:12:28","slug":"edr","status":"publish","type":"page","link":"https:\/\/www.stormshield.com\/fr\/edr\/","title":{"rendered":"Endpoint Detection &#038; Response &#8211; EDR"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_top=\"50\" padding_bottom=\"50\" css=\".vc_custom_1708942368363{background-color: #ffffff !important;}\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner][vc_empty_space][vc_column_text]<\/p>\n<h1 style=\"text-align: center;\"><span style=\"color: #00aaf5;\"><span style=\"font-weight: 900; font-size: 1.5em;\">Endpoint Detection &amp; Response (EDR),<\/span><\/span><span style=\"color: #00aaf5;\"><span style=\"font-weight: 300; font-size: 1.5em;\"> pour\u00a0la protection de vos terminaux<\/span><\/span><\/h1>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_top=\"50\" padding_bottom=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"3\/4\" css=\".vc_custom_1708939697175{padding-right: 32px !important;padding-left: 32px !important;}\"][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: black; line-height: 0.8em;\">C'est quoi l'EDR\u00a0?<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\">\u00c0 l'int\u00e9rieur de votre parc informatique, chaque terminal connect\u00e9 repr\u00e9sente un potentiel vecteur d'attaque et chaque connexion constitue un point d'entr\u00e9e vers votre syst\u00e8me d'information et vos donn\u00e9es sensibles. Les technologies <a style=\"color: #000000;\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/\" target=\"_blank\" rel=\"noopener\">antivirus<\/a> connaissent des limites face aux cyberattaques avanc\u00e9es. Des limites que peuvent combler les solutions\u00a0EDR (<em>Endpoint Detection and Response<\/em>).<\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\"><strong>Ces solutions EDR interviennent pour renforcer la s\u00e9curit\u00e9 des terminaux avec une surveillance en temps r\u00e9el, une d\u00e9tection intelligente des intrusions et leur rem\u00e9diation rapide, ainsi qu'une am\u00e9lioration continue de la protection.<\/strong><\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/4\"][vc_empty_space][vc_single_image image=\"266686\" img_size=\"full\" alignment=\"center\" qode_css_animation=\"\"][vc_empty_space height=\"12px\"][vc_single_image image=\"266672\" img_size=\"full\" alignment=\"center\" qode_css_animation=\"\"][vc_empty_space height=\"12px\"][vc_single_image image=\"266680\" img_size=\"full\" alignment=\"center\" qode_css_animation=\"\"][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"grid\" text_align=\"left\" css_animation=\"\" css=\".vc_custom_1726488240064{padding-right: 32px !important;padding-left: 32px !important;}\"][vc_column_inner width=\"1\/3\" css=\".vc_custom_1708939714814{padding-right: 32px !important;padding-left: 32px !important;}\"][vc_empty_space][vc_single_image image=\"267312\" img_size=\"medium\" qode_css_animation=\"\"][\/vc_column_inner][vc_column_inner width=\"2\/3\"][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: black; line-height: 0.8em;\">Surveillance en temps r\u00e9el des\u00a0terminaux<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\"><strong>La <a style=\"color: #000000;\" href=\"https:\/\/www.stormshield.com\/fr\/produits-et-services\/produits\/protection-des-postes-et-serveurs\/stormshield-endpoint-security\/\" target=\"_blank\" rel=\"noopener\">technologie EDR<\/a> se base sur une collecte des donn\u00e9es qui transitent sur les terminaux, des connexions r\u00e9seau aux diff\u00e9rents processus, en passant par les fichiers ouverts, le chargement des pilotes, l'utilisation de la m\u00e9moire et du disque, ou encore l'acc\u00e8s \u00e0 la base de donn\u00e9es centrale.<\/strong> Par la suite, toutes ces donn\u00e9es sont transmises \u00e0 un moteur d'analyse EDR, qui va d\u00e9tecter les <a style=\"color: #000000;\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/poste-de-travail-immersion-dans-le-monde-des-comportements-suspects\/\" target=\"_blank\" rel=\"noopener\">comportements suspects<\/a> et anormaux. \u00c0 la cl\u00e9, une visibilit\u00e9 en temps r\u00e9el et compl\u00e8te sur toutes les activit\u00e9s des terminaux, pour une identification rapide d'activit\u00e9s malveillantes.<br \/>\n<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"2\/3\"][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: black; line-height: 0.8em;\">D\u00e9tection intelligente et rem\u00e9diation\u00a0rapide<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\">Les technologies EDR font appel \u00e0 l'analyse comportementale pour reconna\u00eetre ces comportements suspects et anormaux. La phase d\u2019analyse des donn\u00e9es centralis\u00e9es est cl\u00e9, car elle corrobore des informations pour en d\u00e9duire des sch\u00e9mas d'attaque, y compris les cyberattaques de type Zero-Day. <strong>En cas de d\u00e9tection d'une cyber-menace ou de tentative d'intrusion, l\u2019EDR pr\u00e9conise des mesures de rem\u00e9diation comme l'arr\u00eat d\u2019un processus en cours, le blocage d'une ex\u00e9cution, la mise en quarantaine d'un fichier, ou encore l'isolation de terminaux infect\u00e9s...<\/strong> Les administrateurs et analystes s\u00e9curit\u00e9 pourront alors investiguer \u00e0 partir des r\u00e9sultats d\u2019analyses et appliquer les choix de rem\u00e9diation les plus appropri\u00e9s.<br \/>\n<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/3\" css=\".vc_custom_1708939721806{padding-right: 32px !important;padding-left: 32px !important;}\"][vc_empty_space][vc_single_image image=\"267306\" img_size=\"medium\" qode_css_animation=\"\"][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"1\/3\" css=\".vc_custom_1708939727974{padding-right: 32px !important;padding-left: 32px !important;}\"][vc_single_image image=\"267297\" img_size=\"medium\" qode_css_animation=\"\"][vc_empty_space][\/vc_column_inner][vc_column_inner width=\"2\/3\"][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: black; line-height: 0.8em;\">Am\u00e9lioration continue de la\u00a0protection<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\">Face \u00e0 l\u2019\u00e9volution constante des modes op\u00e9ratoires, la solution EDR aide la compr\u00e9hension et l'apprentissage des \u00e9quipes S\u00e9curit\u00e9. <strong>Gr\u00e2ce aux donn\u00e9es collect\u00e9es et analys\u00e9es lors des phases d'investigation, elles sont mieux arm\u00e9es pour lutter contre les cyberattaques futures.<\/strong> La r\u00e9ponse \u00e0 incident permet alors notamment de mieux comprendre les actions pass\u00e9es, par exemple en visualisant les liens de causalit\u00e9 d\u2019une cha\u00eene d\u2019attaque, et d'am\u00e9liorer de mani\u00e8re continue la protection apport\u00e9e par la solution EDR.<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" css=\".vc_custom_1726488344224{padding-top: 32px !important;padding-right: 32px !important;padding-bottom: 32px !important;padding-left: 32px !important;background-color: #060051 !important;}\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner][vc_empty_space][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: #ffffff; line-height: 0.8em;\">Stormshield Endpoint Security Evolution, votre solution EDR\u00a0certifi\u00e9e<\/span><\/h2>\n<p><span style=\"color: #ffffff; font-size: 1.1em;\">Avec la solution Stormshield Endpoint Security Evolution (SES), augmentez le niveau de protection de vos postes de travail avec une solution EDR proactive. Bas\u00e9e sur une technologie d\u2019analyse sans signature, la solution SES d\u00e9tecte les attaques et cyber-menaces, et y r\u00e9pond de mani\u00e8re appropri\u00e9e. Notre solution EDR de confiance a obtenu la certification de s\u00e9curit\u00e9 de premier niveau (<a style=\"color: #ffffff;\" href=\"https:\/\/cyber.gouv.fr\/produits-certifies\/stormshield-endpoint-security-evolution-version-243\" target=\"_blank\" rel=\"noopener\">CSPN<\/a>), d\u00e9livr\u00e9e par l'ANSSI pour la cat\u00e9gorie D\u00e9tection d'intrusions.<\/span><\/p>\n<p><span style=\"color: #000; font-size: 1.1em;\"><span style=\"color: #ffffff;\"><strong>D\u00e9couvrez une solution EDR de protection des terminaux et serveurs de nouvelle g\u00e9n\u00e9ration.<\/strong> Et avec ses fonctionnalit\u00e9s de Cyber Threat Intelligence et de Threat Hunting, b\u00e9n\u00e9ficiez d\u2019une capacit\u00e9 de d\u00e9tection avanc\u00e9e des cyberattaques les plus sophistiqu\u00e9es.<\/span><\/span>[\/vc_column_text][vc_empty_space][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"1\/3\"]<div class=\"qode_video_box\">\n\t<a itemprop=\"image\" class=\"qode_video_image\" href=\"https:\/\/youtu.be\/7ZOk5vCkEfk\" data-rel=\"prettyPhoto\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1917\" height=\"1073\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fr1.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fr1.jpg 1917w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fr1-300x168.jpg 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fr1-1024x573.jpg 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fr1-768x430.jpg 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fr1-1536x860.jpg 1536w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fr1-1396x781.jpg 1396w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fr1-700x392.jpg 700w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fr1-539x303.jpg 539w\" sizes=\"auto, (max-width: 1917px) 100vw, 1917px\" \/>\t\t\t<span class=\"qode_video_box_button_holder\">\n\t\t\t\t<span class=\"qode_video_box_button\">\n\t\t\t\t\t<span class=\"qode_video_box_button_arrow\">\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/span>\n\t\t\t<\/a>\n<\/div>[vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/3\"]<div class=\"qode_video_box\">\n\t<a itemprop=\"image\" class=\"qode_video_image\" href=\"https:\/\/youtu.be\/GOHld7waK0o\" data-rel=\"prettyPhoto\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1916\" height=\"1076\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-36.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-36.jpg 1916w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-36-300x168.jpg 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-36-1024x575.jpg 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-36-768x431.jpg 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-36-1536x863.jpg 1536w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-36-1396x784.jpg 1396w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-36-700x393.jpg 700w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-36-539x303.jpg 539w\" sizes=\"auto, (max-width: 1916px) 100vw, 1916px\" \/>\t\t\t<span class=\"qode_video_box_button_holder\">\n\t\t\t\t<span class=\"qode_video_box_button\">\n\t\t\t\t\t<span class=\"qode_video_box_button_arrow\">\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/span>\n\t\t\t<\/a>\n<\/div>[vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/3\"]<div class=\"qode_video_box\">\n\t<a itemprop=\"image\" class=\"qode_video_image\" href=\"https:\/\/youtu.be\/SmkU_jc7iL0\" data-rel=\"prettyPhoto\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1272\" height=\"715\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-54.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-54.jpg 1272w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-54-300x169.jpg 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-54-1024x576.jpg 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-54-768x432.jpg 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-54-700x393.jpg 700w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-54-539x303.jpg 539w\" sizes=\"auto, (max-width: 1272px) 100vw, 1272px\" \/>\t\t\t<span class=\"qode_video_box_button_holder\">\n\t\t\t\t<span class=\"qode_video_box_button\">\n\t\t\t\t\t<span class=\"qode_video_box_button_arrow\">\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/span>\n\t\t\t<\/a>\n<\/div>[vc_empty_space][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner]<a  itemprop=\"url\" href=\"https:\/\/www.stormshield.com\/fr\/produits-et-services\/produits\/protection-des-postes-et-serveurs\/stormshield-endpoint-security\/\" target=\"_blank\" data-hover-background-color=\"#d23467\" data-hover-border-color=\"#d23467\" class=\"qbutton  center white enlarge\" style=\"border-color: #ffffff; background-color:#00aaf5;\">D\u00e9couvrir Stormshield Endpoint Security<i class=\"qode_icon_font_awesome fa fa-angle-right qode_button_icon_element\"><\/i><\/a>[vc_empty_space][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" css=\".vc_custom_1708702319908{background-color: #ffffff !important;}\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"1\/2\"][vc_empty_space]<span class=\"separator_with_icon\" style=\"color:#060051\"><i class=\"fa fa-question\"><\/i><\/span>[vc_column_text]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\"><strong>FAQ\u00a0: Comment fonctionne un EDR\u00a0?<\/strong> Pour d\u00e9tecter les cyberattaques sophistiqu\u00e9es, l\u2019EDR rep\u00e8re les comportements suspects et anormaux gr\u00e2ce \u00e0 des indices de compromission (IoC - <em>Indicators of Compromise<\/em>). Il ne s\u2019agit pas toujours d\u2019\u00e9v\u00e9nements exceptionnels, il peut s\u2019agir d\u2019actions banales comme le fait d\u2019ouvrir une connexion sur un serveur externe. Une fois ces comportements suspects identifi\u00e9s, la solution EDR pr\u00e9conise des mesures de rem\u00e9diation rapide et permet une investigation ult\u00e9rieure \u00e0 partir des r\u00e9sultats d\u2019analyses.<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/2\" css=\".vc_custom_1708696718516{padding-top: 32px !important;padding-right: 32px !important;padding-bottom: 32px !important;padding-left: 32px !important;background-color: #f9f9f9 !important;}\"]<span class=\"separator_with_icon\" style=\"color:#060051\"><i class=\"fa fa-question\"><\/i><\/span>[vc_column_text]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\"><strong>FAQ : EDR ou XDR\u00a0?<\/strong> Il est indispensable pour les outils de protection des terminaux d\u2019int\u00e9grer une capacit\u00e9 de d\u00e9tection et r\u00e9ponse \u00e0 incident. En compl\u00e9ment de l'EDR informatique, la plateforme XDR (<em>eXtended Detection and Response<\/em>) entend rassembler l\u2019ensemble des actifs informatiques internes et externes (r\u00e9seau, annuaires, ressources cloud, firewalls, etc.) dans le but de fournir une vision d\u2019ensemble des \u00e9v\u00e9nements du syst\u00e8me d\u2019information.<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=\u00a0\u00bb\u00a0\u00bb row_type=\u00a0\u00bbrow\u00a0\u00bb use_row_as_full_screen_section=\u00a0\u00bbno\u00a0\u00bb type=\u00a0\u00bbgrid\u00a0\u00bb angled_section=\u00a0\u00bbno\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb background_image_as_pattern=\u00a0\u00bbwithout_pattern\u00a0\u00bb z_index=\u00a0\u00bb\u00a0\u00bb padding_top=\u00a0\u00bb50&Prime; padding_bottom=\u00a0\u00bb50&Prime; css=\u00a0\u00bb.vc_custom_1708942368363{background-color: #ffffff !important;}\u00a0\u00bb][vc_column][vc_row_inner row_type=\u00a0\u00bbrow\u00a0\u00bb type=\u00a0\u00bbfull_width\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb css_animation=\u00a0\u00bb\u00a0\u00bb][vc_column_inner][vc_empty_space][vc_column_text] Endpoint Detection &amp; Response (EDR), pour\u00a0la protection de vos terminaux [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\u00a0\u00bb\u00a0\u00bb row_type=\u00a0\u00bbrow\u00a0\u00bb use_row_as_full_screen_section=\u00a0\u00bbno\u00a0\u00bb type=\u00a0\u00bbgrid\u00a0\u00bb angled_section=\u00a0\u00bbno\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb background_image_as_pattern=\u00a0\u00bbwithout_pattern\u00a0\u00bb z_index=\u00a0\u00bb\u00a0\u00bb padding_top=\u00a0\u00bb50&Prime; padding_bottom=\u00a0\u00bb50&Prime;][vc_column][vc_row_inner row_type=\u00a0\u00bbrow\u00a0\u00bb type=\u00a0\u00bbfull_width\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb css_animation=\u00a0\u00bb\u00a0\u00bb][vc_column_inner width=\u00a0\u00bb3\/4&Prime; css=\u00a0\u00bb.vc_custom_1708939697175{padding-right:&#8230;<\/p>\n","protected":false},"author":31,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"full_width.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-497591","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EDR - Endpoint Detection &amp; Response, la protection des terminaux<\/title>\n<meta name=\"description\" content=\"Endpoint Detection &amp; Response, des solutions EDR de cybers\u00e9curit\u00e9 next-generation pour renforcer la s\u00e9curit\u00e9 des terminaux.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/edr\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EDR - Endpoint Detection &amp; Response, la protection des terminaux\" \/>\n<meta property=\"og:description\" content=\"Endpoint Detection &amp; Response, des solutions EDR de cybers\u00e9curit\u00e9 next-generation pour renforcer la s\u00e9curit\u00e9 des terminaux.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/edr\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-06T12:12:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/stormshield_logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"204\" \/>\n\t<meta property=\"og:image:height\" content=\"94\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/edr\/\",\"url\":\"https:\/\/www.stormshield.com\/fr\/edr\/\",\"name\":\"EDR - Endpoint Detection & Response, la protection des terminaux\",\"isPartOf\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/#website\"},\"datePublished\":\"2024-02-29T15:53:03+00:00\",\"dateModified\":\"2025-05-06T12:12:28+00:00\",\"description\":\"Endpoint Detection & Response, des solutions EDR de cybers\u00e9curit\u00e9 next-generation pour renforcer la s\u00e9curit\u00e9 des terminaux.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/edr\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stormshield.com\/fr\/edr\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/edr\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stormshield.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Endpoint Detection &#038; Response &#8211; EDR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#website\",\"url\":\"https:\/\/www.stormshield.com\/fr\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EDR - Endpoint Detection & Response, la protection des terminaux","description":"Endpoint Detection & Response, des solutions EDR de cybers\u00e9curit\u00e9 next-generation pour renforcer la s\u00e9curit\u00e9 des terminaux.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/edr\/","og_locale":"fr_FR","og_type":"article","og_title":"EDR - Endpoint Detection & Response, la protection des terminaux","og_description":"Endpoint Detection & Response, des solutions EDR de cybers\u00e9curit\u00e9 next-generation pour renforcer la s\u00e9curit\u00e9 des terminaux.","og_url":"https:\/\/www.stormshield.com\/fr\/edr\/","og_site_name":"Stormshield","article_modified_time":"2025-05-06T12:12:28+00:00","og_image":[{"width":204,"height":94,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/stormshield_logo.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@Stormshield","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/edr\/","url":"https:\/\/www.stormshield.com\/fr\/edr\/","name":"EDR - Endpoint Detection & Response, la protection des terminaux","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"datePublished":"2024-02-29T15:53:03+00:00","dateModified":"2025-05-06T12:12:28+00:00","description":"Endpoint Detection & Response, des solutions EDR de cybers\u00e9curit\u00e9 next-generation pour renforcer la s\u00e9curit\u00e9 des terminaux.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/edr\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/edr\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/edr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Endpoint Detection &#038; Response &#8211; EDR"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/pages\/497591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=497591"}],"version-history":[{"count":52,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/pages\/497591\/revisions"}],"predecessor-version":[{"id":634328,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/pages\/497591\/revisions\/634328"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=497591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}