{"id":413689,"date":"2023-05-17T08:00:07","date_gmt":"2023-05-17T07:00:07","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=413689"},"modified":"2024-03-21T10:14:52","modified_gmt":"2024-03-21T09:14:52","slug":"solution-de-protection-endpoint-et-antivirus-complementarite-et-difference","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/","title":{"rendered":"Solutions de protection endpoint et antivirus : c\u2019est quoi la diff\u00e9rence ?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-413690\" title=\"Contributeur : Illus_man. Image utilis\u00e9e sous licence de Shutterstock.com\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/endpoint-protection-solution-and-antivirus-stormshield-300x100.jpg\" alt=\"Antivirus, EDR, XDR : petite histoire de la protection des postes de travail | Stormshield\" width=\"800\" height=\"267\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/endpoint-protection-solution-and-antivirus-stormshield-300x100.jpg 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/endpoint-protection-solution-and-antivirus-stormshield-1024x342.jpg 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/endpoint-protection-solution-and-antivirus-stormshield-768x257.jpg 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/endpoint-protection-solution-and-antivirus-stormshield-1536x513.jpg 1536w, https:\/\/www.stormshield.com\/wp-content\/uploads\/endpoint-protection-solution-and-antivirus-stormshield-2048x684.jpg 2048w, https:\/\/www.stormshield.com\/wp-content\/uploads\/endpoint-protection-solution-and-antivirus-stormshield-1396x466.jpg 1396w, https:\/\/www.stormshield.com\/wp-content\/uploads\/endpoint-protection-solution-and-antivirus-stormshield-700x234.jpg 700w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><strong>Pr\u00e8s d\u2019une d\u00e9cennie apr\u00e8s la mort annonc\u00e9e de l\u2019antivirus traditionnel, ce dernier garde une belle cote de popularit\u00e9 aupr\u00e8s du grand public. Utilis\u00e9 couramment dans le champ lexical du monde informatique, l\u2019antivirus a cependant perdu ses lettres de noblesse. Explications et petite histoire de la protection des postes de travail.<\/strong><\/p>\n<p>Laissant tour \u00e0 tour sa place aux termes d\u2019antivirus de nouvelle g\u00e9n\u00e9ration (NGAV) mais aussi d\u2019EPP (<em>Endpoint Protection Platform<\/em>) ou encore d\u2019EDR (<em>Endpoint Detection and Response<\/em>), l\u2019utilisation des antivirus traditionnels semble aujourd\u2019hui obsol\u00e8te. Quelles sont les diff\u00e9rences entre toutes ces technologies de d\u00e9tection\u00a0? Avons-nous encore besoin d\u2019un antivirus aujourd\u2019hui\u00a0? R\u00e9ponses \u00e0 ces questions dans ce papier.<\/p>\n<p>&nbsp;<\/p>\n<h2>Les antivirus sont-ils une protection encore fiable\u00a0?<\/h2>\n<p>Con\u00e7u pour \u00eatre install\u00e9 sur des terminaux individuels comme un ordinateur, une tablette ou encore un t\u00e9l\u00e9phone, l\u2019antivirus est un programme informatique qui vise \u00e0 d\u00e9tecter et \u00e0 supprimer tous logiciels malveillants. D\u00e9velopp\u00e9 pour la premi\u00e8re fois par la soci\u00e9t\u00e9 IBM en 1987 en r\u00e9ponse au virus informatique \u201cBrain\u201d, <strong>le terme d\u2019antivirus sera popularis\u00e9 au fil des ann\u00e9es \u00e0 grand renfort de publicit\u00e9, devenant dans l\u2019imaginaire collectif le seul rempart aux virus informatiques.<\/strong><\/p>\n<p>Le principe de ces logiciels antivirus repose sur la recherche de signatures. \u00ab\u00a0<em>\u00c0 l\u2019image d\u2019un vaccin, l\u2019antivirus dispose d\u2019une base de signatures qui va lui permettre de reconna\u00eetre le virus informatique. Il est donc indispensable que la signature de ce virus sp\u00e9cifique ait \u00e9t\u00e9 g\u00e9n\u00e9r\u00e9e au pr\u00e9alable<\/em>\u00a0\u00bb, rappelle <strong>St\u00e9phane Pr\u00e9vost<\/strong>, Product Marketing Manager chez Stormshield. Un fonctionnement qui induit diff\u00e9rentes probl\u00e9matiques et limites. La premi\u00e8re d\u2019entre elle est qu\u2019il est n\u00e9cessaire de conna\u00eetre le virus avant d\u2019en identifier la signature (et de pouvoir le combattre). La seconde limite, et non des moindres, tient \u00e0 l\u2019av\u00e8nement du polymorphisme, une technique de g\u00e9n\u00e9ration de fichiers malveillants dont la signature num\u00e9rique est unique \u00e0 chaque fichier mais dont la m\u00e9thode d\u2019infection et la charge utile restent communes. Une limite d\u2019autant plus pr\u00e9gnante que <a href=\"https:\/\/www.av-test.org\/en\/statistics\/malware\/\" target=\"_blank\" rel=\"noopener\">450\u00a0000\u00a0nouveaux logiciels malveillants sont cr\u00e9\u00e9s chaque jour<\/a><u>,<\/u> soit pr\u00e8s de 4 millions chaque mois, d\u2019apr\u00e8s l\u2019Institut AV-TEST. Cons\u00e9quence directe de cette explosion, il est techniquement impossible que les antivirus aient connaissance au pr\u00e9alable de toutes les signatures\u2026 Pire encore pour les logiciels antivirus, les modes op\u00e9ratoires des cyber-criminels n\u2019ont cess\u00e9 d\u2019\u00e9voluer ces derni\u00e8res ann\u00e9es jusqu\u2019\u00e0 se nicher dans des angles morts dans les algorithmes de d\u00e9tection \u00e0 l\u2019image des cyberattaques sans fichier (<em><a href=\"https:\/\/www.stormshield.com\/fr\/actus\/fileless-malware-comment-ca-marche\/\">fileless malwares<\/a><\/em>). Le r\u00e9sultat\u00a0? Le m\u00e9canisme de d\u00e9tection bas\u00e9 sur la recherche d\u2019empreinte num\u00e9rique dans un fichier laisse passer une large majorit\u00e9 de malwares et doit imp\u00e9rativement \u00eatre compl\u00e9t\u00e9 par d\u2019autres techniques de protection.<\/p>\n<p>L\u2019\u00e9volution et la sophistication des cyberattaques va m\u00eame jusqu\u2019\u00e0 transformer les antivirus en <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/et-si-votre-antivirus-origine-une-cyberattaque\/\">cible<\/a>. Lors de la conf\u00e9rence \u00ab Black Hat Europe \u00bb de d\u00e9cembre 2022, un chercheur en s\u00e9curit\u00e9 a par exemple r\u00e9v\u00e9l\u00e9 <a href=\"https:\/\/www.safebreach.com\/resources\/blog\/safebreach-labs-researcher-discovers-multiple-zero-day-vulnerabilities\/\" target=\"_blank\" rel=\"noopener\">une vuln\u00e9rabilit\u00e9 in\u00e9dite qui touche plusieurs antivirus<\/a>. Une faille qui permet de prendre la main sur les antivirus et de les faire\u2026 effacer des fichiers l\u00e9gitimes. Que faire alors lorsque notre principal outil de protection ne remplit plus son r\u00f4le\u00a0?<\/p>\n<p>&nbsp;<\/p>\n<h2>L\u2019av\u00e8nement de la d\u00e9tection comportementale dans la protection des postes de travail<\/h2>\n<p>Nouvelle \u00e9tape dans cette petite histoire de la protection des postes de travail. Pour r\u00e9pondre \u00e0 cette nouvelle situation, <strong>les \u00e9diteurs de cybers\u00e9curit\u00e9 ont d\u00fb revoir leur copie, passant de la recherche d\u2019empreintes \u00e0 celle de l\u2019analyse heuristique bas\u00e9e sur le comportement de l\u2019utilisateur.<\/strong> Appel\u00e9s <em>Next-Gen Antivirus<\/em> ou NGAV, ces antivirus d\u2019un nouveau genre d\u00e9velopperont le socle de ce qui deviendra le concept de EPP (<em>Endpoint Protection Platform<\/em>). Les solutions d'<em>Endpoint Protection Platform<\/em> (EPP) seront une premi\u00e8re r\u00e9ponse au polymorphisme et aux attaques sans fichier en int\u00e9grant de nouvelles fonctionnalit\u00e9s comme la surveillance de la m\u00e9moire, l\u2019analyse comportementale ou la v\u00e9rification d\u2019indicateurs de compromission (IoCs). Malgr\u00e9 cette avanc\u00e9e technologique, des cyberattaques sournoises continuaient de passer entre les mailles du filet. Il est alors devenu imp\u00e9ratif les d\u00e9tecter m\u00eame une fois pass\u00e9es et d'y r\u00e9pondre.<\/p>\n<p>C\u2019est sur ce constat que les solutions de <em>Endpoint Threat Detection &amp; Response<\/em> (ETDR) font leur apparition en 2013 dans les analyses du cabinet Gartner, autour des th\u00e9matiques de r\u00e9ponses \u00e0 incidents et d\u2019investigation. D\u00e8s 2015, l\u2019acronyme ETDR sera remplac\u00e9 par celui d\u2019EDR pour <em>Endpoint Detection &amp; Response<\/em>. La particularit\u00e9 de cette nouvelle approche r\u00e9side dans la capacit\u00e9 \u00e0 d\u00e9tecter des menaces inconnues et \u00e0 y r\u00e9pondre en temps r\u00e9el de mani\u00e8re semi-autonome, comme le souligne <strong>No\u00ebl Chazotte<\/strong>, Product Manager Stormshield\u00a0: \u00ab\u00a0<em>S\u2019il d\u00e9tecte une menace, l\u2019antivirus va bloquer le programme en amont, parfois le mettre en quarantaine. De son c\u00f4t\u00e9, l\u2019EDR entre en action lorsque l\u2019incident de s\u00e9curit\u00e9 est d\u00e9tect\u00e9 ou qu\u2019il s\u2019est d\u00e9j\u00e0 produit sur la machine et essaye de d\u00e9terminer ce qui s\u2019est pass\u00e9 au niveau du poste pour aider les \u00e9quipes op\u00e9rationnelles \u00e0 \u00e9viter que l\u2019infection ne se r\u00e9pande.<\/em>\u00a0\u00bb<\/p>\n<p><strong>Comment la technologie EDR d\u00e9tecte-t-elle les attaques sophistiqu\u00e9es\u00a0?<\/strong> \u00ab\u00a0<em>L\u2019EDR rep\u00e8re <\/em><a href=\"https:\/\/www.stormshield.com\/fr\/actus\/poste-de-travail-immersion-dans-le-monde-des-comportements-suspects\/\"><em>les comportements anormaux<\/em><\/a><em> gr\u00e2ce \u00e0 des indices de compromission (IoC)<\/em>, pr\u00e9cise St\u00e9phane Pr\u00e9vost.<em> Il ne s\u2019agit pas toujours d\u2019\u00e9v\u00e9nements exceptionnels, il peut s\u2019agir d\u2019actions banales comme le fait d\u2019ouvrir une connexion sur un serveur externe.<\/em>\u00a0\u00bb D\u2019o\u00f9 l\u2019importance de d\u00e9finir pr\u00e9cis\u00e9ment le cadre de fonctionnement de la solution lors de la phase d\u2019apprentissage pour pr\u00e9venir de fausses alertes (les faux positifs). Mais les solutions d\u2019EDR et d\u2019EPP restent compl\u00e9mentaires comme le souligne St\u00e9phane Pr\u00e9vost\u00a0: \u00ab\u00a0<em>Le parall\u00e8le peut \u00eatre fait avec la s\u00e9curit\u00e9 physique d\u2019une entreprise. La solution d\u2019EDR repr\u00e9sente les cam\u00e9ras de surveillance\u00a0: elles vous permettent de voir si un intrus p\u00e9n\u00e8tre sur votre site industriel par exemple. Mais pour le bloquer d\u00e8s l\u2019entr\u00e9e, il vous faut un vigile sur place\u00a0: c\u2019est l\u2019EPP.<\/em>\u00a0\u00bb<\/p>\n<p>Et l\u2019antivirus dans tout \u00e7a\u00a0? En 2023, selon le site <a href=\"https:\/\/www.security.org\/antivirus\/antivirus-consumer-report-annual\/#:~:text=The%20debate%20rages%20on%3A%20is,percent%20did%20so%20in%202021.\" target=\"_blank\" rel=\"noopener\">security.org<\/a>, trois am\u00e9ricains sur quatre estiment avoir besoin d\u2019un antivirus pour pouvoir utiliser sereinement leur ordinateur personnel. Devant les avanc\u00e9es technologiques \u00e9voqu\u00e9es plus haut, la question se pose\u00a0au niveau pro\u00a0: <strong>pourquoi avons-nous encore besoin d'antivirus aujourd'hui\u00a0?<\/strong> Et la r\u00e9ponse tombe\u00a0: tout simplement parce qu\u2019il apporte une premi\u00e8re couche de s\u00e9curit\u00e9. M\u00eame si cette solution ne sera pas efficace contre toutes les cyberattaques, elle pr\u00e9sente malgr\u00e9 tout un premier niveau de protection contre les attaques les moins sophistiqu\u00e9es \u2013 avec la garantie d\u2019\u00e9viter les probl\u00e9matiques de faux positifs et en consommant tr\u00e8s peu de ressources sur le poste. Mais une premi\u00e8re couche de s\u00e9curit\u00e9 en implique d\u2019autres. \u00ab\u00a0<em>On constate l\u2019installation de plusieurs solutions de protection sur une m\u00eame machine<\/em>, explique No\u00ebl Chazotte.<em> Leur association ne fait toutefois pas toujours bon m\u00e9nage car certaines peuvent engendrer des conflits, laissant une autre porte ouverte aux cyber-criminels.<\/em>\u00a0\u00bb<\/p>\n<p>&nbsp;<\/p>\n<h2>NDR, XDR, MDR\u00a0: vers une sp\u00e9cialisation de la<em> Detection &amp; Response<\/em><\/h2>\n<p>Car malgr\u00e9 les promesses d\u2019autonomie de telles solutions, la gestion de ces outils doit \u00eatre encadr\u00e9e par des experts, comme en t\u00e9moigne le d\u00e9veloppement d\u2019offres d\u2019EDR manag\u00e9 ou de mini-SOC. <strong>En plus d\u2019am\u00e9liorer la d\u00e9tection, il est indispensable pour les outils de protection endpoint d\u2019int\u00e9grer une capacit\u00e9 de d\u00e9tection et r\u00e9ponse \u00e0 incident.<\/strong> Et avec la multiplication des points de collectes d\u2019incidents, l\u2019analyste SOC doit avoir acc\u00e8s \u00e0 l\u2019ensemble des \u00e9quipements r\u00e9seaux et infrastructures.<\/p>\n<p>Ainsi, les solutions de NDR (<em>Network Detection and Response<\/em>) analysent les paquets TCP\/IP qui transitent sur le r\u00e9seau pour d\u00e9tecter toute activit\u00e9 suspecte. La plateforme XDR (<em>eXtended Detection and Response<\/em>) entend, quant \u00e0 elle, rassembler l\u2019ensemble des actifs informatiques internes et externes (r\u00e9seau, annuaires, ressources cloud, firewalls, etc.) dans le but de fournir une vision d\u2019ensemble des \u00e9v\u00e9nements du syst\u00e8me d\u2019information. Pour No\u00ebl Chazotte, \u00ab\u00a0<em>une plateforme XDR est un ensemble de points de collectes et surtout une plateforme de corr\u00e9lation pour aider, mitiger le risque, apporter des \u00e9l\u00e9ments de r\u00e9ponse ainsi que de rem\u00e9diation.<\/em>\u00a0\u00bb<\/p>\n<p>D\u2019autres acronymes \u00e9mergent depuis quelques ann\u00e9es comme le MDR. Dans les faits, le <em>Managed Detection and Response<\/em> (MDR) correspond simplement \u00e0 un mode de commercialisation d\u2019un XDR dans lequel une \u00e9quipe externe traite les alertes. Quel que soit l\u2019outil et la technologie, il faut garder \u00e0 l\u2019esprit que la place de l\u2019analyste reste centrale et qu\u2019aucune technologie ne pourra s\u00e9curiser \u00e0 elle seule un actif sensible.<\/p>\n<p>&nbsp;<\/p>\n<p>Selon <a href=\"https:\/\/www.scmagazine.com\/resource\/incident-response\/what-is-xdr-and-who-should-buy-in\" target=\"_blank\" rel=\"noopener\">l\u2019\u00e9tude<\/a> de l\u2019organisation Survey Risk Alliance, seuls 12% des professionnels de la cybers\u00e9curit\u00e9 annoncent avoir adopt\u00e9 une solution XDR dans leur organisation en 2022. Les 77% restants annoncent planifier son adoption dans les 24 prochains mois. La demande d\u2019experts s\u00e9curit\u00e9 sp\u00e9cialis\u00e9s en d\u00e9tection et r\u00e9ponse \u00e0 incident devrait donc continuer de cro\u00eetre dans les prochaines ann\u00e9es. Car malgr\u00e9 les progr\u00e8s technologiques, l\u2019intervention humaine reste indispensable pour analyser, comprendre les incidents\u2026 Des profils tr\u00e8s recherch\u00e9s pour faire face \u00e0 l\u2019\u00e9volution constante des modes op\u00e9ratoires et dont les services seront sans doute plus facilement accessibles aux entreprises via des offres d\u2019EDR manag\u00e9 ou de mini-SOC.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pr\u00e8s d\u2019une d\u00e9cennie apr\u00e8s la mort annonc\u00e9e de l\u2019antivirus traditionnel, ce dernier garde une belle cote de popularit\u00e9 aupr\u00e8s du grand public. Utilis\u00e9 couramment dans le champ lexical du monde informatique, l\u2019antivirus a cependant perdu ses lettres de noblesse. Explications et petite histoire de la&#8230;<\/p>\n","protected":false},"author":27,"featured_media":413684,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1608],"tags":[4363],"business_size":[],"industry":[],"help_mefind":[],"features":[],"type_security":[],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1565,13588],"class_list":["post-413689","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-paroles-experts","tag-la-cybersecurite-premiers-pas","listing_product-ses-fr","listing_product-xdr-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Antivirus, EDR, XDR : protections endpoint face aux cyberattaques<\/title>\n<meta name=\"description\" content=\"Petite histoire de la protection des postes de travail : les solutions EDR et XDR face aux d\u00e9faillances des antivirus traditionnels.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Antivirus, EDR, XDR : protections endpoint face aux cyberattaques\" \/>\n<meta property=\"og:description\" content=\"Petite histoire de la protection des postes de travail : les solutions EDR et XDR face aux d\u00e9faillances des antivirus traditionnels.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-17T07:00:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-21T09:14:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-1354820336-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Julien Paffumi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jpaffumi\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Paffumi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\\\/\"},\"author\":{\"name\":\"Julien Paffumi\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/ef3079d07ef4ec87c3550d708f439736\"},\"headline\":\"Solutions de protection endpoint et antivirus : c\u2019est quoi la diff\u00e9rence ?\",\"datePublished\":\"2023-05-17T07:00:07+00:00\",\"dateModified\":\"2024-03-21T09:14:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\\\/\"},\"wordCount\":1673,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock-1354820336-scaled.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - premiers pas\"],\"articleSection\":[\"Paroles d'experts\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\\\/\",\"name\":\"Antivirus, EDR, XDR : protections endpoint face aux cyberattaques\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock-1354820336-scaled.jpg\",\"datePublished\":\"2023-05-17T07:00:07+00:00\",\"dateModified\":\"2024-03-21T09:14:52+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/ef3079d07ef4ec87c3550d708f439736\"},\"description\":\"Petite histoire de la protection des postes de travail : les solutions EDR et XDR face aux d\u00e9faillances des antivirus traditionnels.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock-1354820336-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock-1354820336-scaled.jpg\",\"width\":2560,\"height\":1600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions de protection endpoint et antivirus : c\u2019est quoi la diff\u00e9rence ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/ef3079d07ef4ec87c3550d708f439736\",\"name\":\"Julien Paffumi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e4eafe059d680a3dcefed086ed3844f7026fb2ea4885f794fec4f9a450a8c0fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e4eafe059d680a3dcefed086ed3844f7026fb2ea4885f794fec4f9a450a8c0fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e4eafe059d680a3dcefed086ed3844f7026fb2ea4885f794fec4f9a450a8c0fe?s=96&d=mm&r=g\",\"caption\":\"Julien Paffumi\"},\"description\":\"Julien Paffumi began his career at Arkoon in the R&amp;D department as a Quality Engineer. He then became Product Manager for Arkoon Fast360 firewalls, followed by the Stormshield Management Center centralised administration console, before becoming Product Portfolio Manager. Now Head of Product Management, Julien leads the Product Management team in collectively defining the direction of the entire Stormshield portfolio.\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/jpaffumi\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Antivirus, EDR, XDR : protections endpoint face aux cyberattaques","description":"Petite histoire de la protection des postes de travail : les solutions EDR et XDR face aux d\u00e9faillances des antivirus traditionnels.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/","og_locale":"fr_FR","og_type":"article","og_title":"Antivirus, EDR, XDR : protections endpoint face aux cyberattaques","og_description":"Petite histoire de la protection des postes de travail : les solutions EDR et XDR face aux d\u00e9faillances des antivirus traditionnels.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/","og_site_name":"Stormshield","article_published_time":"2023-05-17T07:00:07+00:00","article_modified_time":"2024-03-21T09:14:52+00:00","og_image":[{"width":2560,"height":1600,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-1354820336-scaled.jpg","type":"image\/jpeg"}],"author":"Julien Paffumi","twitter_card":"summary_large_image","twitter_creator":"@jpaffumi","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Julien Paffumi","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/"},"author":{"name":"Julien Paffumi","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/ef3079d07ef4ec87c3550d708f439736"},"headline":"Solutions de protection endpoint et antivirus : c\u2019est quoi la diff\u00e9rence ?","datePublished":"2023-05-17T07:00:07+00:00","dateModified":"2024-03-21T09:14:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/"},"wordCount":1673,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-1354820336-scaled.jpg","keywords":["La cybers\u00e9curit\u00e9 - premiers pas"],"articleSection":["Paroles d'experts"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/","name":"Antivirus, EDR, XDR : protections endpoint face aux cyberattaques","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-1354820336-scaled.jpg","datePublished":"2023-05-17T07:00:07+00:00","dateModified":"2024-03-21T09:14:52+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/ef3079d07ef4ec87c3550d708f439736"},"description":"Petite histoire de la protection des postes de travail : les solutions EDR et XDR face aux d\u00e9faillances des antivirus traditionnels.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-1354820336-scaled.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-1354820336-scaled.jpg","width":2560,"height":1600},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/solution-de-protection-endpoint-et-antivirus-complementarite-et-difference\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Solutions de protection endpoint et antivirus : c\u2019est quoi la diff\u00e9rence ?"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/ef3079d07ef4ec87c3550d708f439736","name":"Julien Paffumi","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e4eafe059d680a3dcefed086ed3844f7026fb2ea4885f794fec4f9a450a8c0fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e4eafe059d680a3dcefed086ed3844f7026fb2ea4885f794fec4f9a450a8c0fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4eafe059d680a3dcefed086ed3844f7026fb2ea4885f794fec4f9a450a8c0fe?s=96&d=mm&r=g","caption":"Julien Paffumi"},"description":"Julien Paffumi began his career at Arkoon in the R&amp;D department as a Quality Engineer. He then became Product Manager for Arkoon Fast360 firewalls, followed by the Stormshield Management Center centralised administration console, before becoming Product Portfolio Manager. Now Head of Product Management, Julien leads the Product Management team in collectively defining the direction of the entire Stormshield portfolio.","sameAs":["https:\/\/x.com\/jpaffumi"]}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/413689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=413689"}],"version-history":[{"count":4,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/413689\/revisions"}],"predecessor-version":[{"id":451905,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/413689\/revisions\/451905"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/413684"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=413689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=413689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=413689"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=413689"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=413689"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=413689"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=413689"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=413689"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=413689"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=413689"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=413689"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=413689"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=413689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}