{"id":486,"date":"2024-10-10T16:09:44","date_gmt":"2024-10-10T14:09:44","guid":{"rendered":"https:\/\/staging.threatproof.com\/securite-infinie-tm\/"},"modified":"2025-02-14T10:51:26","modified_gmt":"2025-02-14T09:51:26","slug":"partenaires","status":"publish","type":"page","link":"https:\/\/staging.threatproof.com\/fr\/partenaires\/","title":{"rendered":"Partenaires"},"content":{"rendered":"\n<section id=\"section-5f04596a-1dd0-47cf-8c90-8825c48c74f7\" class=\"wp-block-gutentor-image-box gutentor-section gutentor-image-wrapper imagebox-template1 has-color-bg has-custom-bg partners-list-block\"><div class=\"grid-container\"><div class=\"grid-row gutentor-grid-item-wrap\"><div class=\"gutentor-grid-column grid-lg-4 grid-md-4 grid-12\"><div class=\"gutentor-single-item gutentor-image gutentor-single-item-0\"><div class=\"gutentor-single-item-wrap\"><div class=\"gutentor-single-item-image-box\"><div class=\"gutentor-image-thumb\"><img loading=\"lazy\" decoding=\"async\" class=\"normal-image\" src=\"https:\/\/staging.threatproof.com\/wp-content\/uploads\/2025\/02\/logo-acronis.png\" alt=\"\" height=\"80\" width=\"152\" \/><\/div><\/div><div class=\"gutentor-single-item-content\"><h3 class=\"gutentor-single-item-title\">Acronis<\/h3><p class=\"gutentor-single-item-desc\">Acronis Cyber Protect int\u00e8gre la protection des donn\u00e9es et la cybers\u00e9curit\u00e9 au sein d&rsquo;une seule plateforme, offrant des sauvegardes s\u00e9curis\u00e9es, une protection anti-ransomware et une d\u00e9tection des menaces sur les terminaux. Ses outils bas\u00e9s sur l&rsquo;IA garantissent la continuit\u00e9 des activit\u00e9s et la conformit\u00e9, id\u00e9al pour les environnements de travail \u00e0 distance modernes.<\/p><\/div><\/div><\/div><\/div><div class=\"gutentor-grid-column grid-lg-4 grid-md-4 grid-12\"><div class=\"gutentor-single-item gutentor-image gutentor-single-item-1\"><div class=\"gutentor-single-item-wrap\"><div class=\"gutentor-single-item-image-box\"><div class=\"gutentor-image-thumb\"><img loading=\"lazy\" decoding=\"async\" class=\"normal-image\" src=\"https:\/\/staging.threatproof.com\/wp-content\/uploads\/2024\/10\/cynet.png\" alt=\"\" height=\"77\" width=\"147\" \/><\/div><\/div><div class=\"gutentor-single-item-content\"><h3 class=\"gutentor-single-item-title\">cynet<\/h3><p class=\"gutentor-single-item-desc\">Cynet est une plateforme de cybers\u00e9curit\u00e9 compl\u00e8te et autonome qui offre une d\u00e9tection, une pr\u00e9vention et une r\u00e9ponse avanc\u00e9es aux menaces sur les r\u00e9seaux, les terminaux et les utilisateurs, en s&rsquo;appuyant sur l&rsquo;IA et l&rsquo;automatisation pour simplifier les op\u00e9rations de s\u00e9curit\u00e9.<\/p><\/div><\/div><\/div><\/div><div class=\"gutentor-grid-column grid-lg-4 grid-md-4 grid-12\"><div class=\"gutentor-single-item gutentor-image gutentor-single-item-2\"><div class=\"gutentor-single-item-wrap\"><div class=\"gutentor-single-item-image-box\"><div class=\"gutentor-image-thumb\"><img loading=\"lazy\" decoding=\"async\" class=\"normal-image\" src=\"https:\/\/staging.threatproof.com\/wp-content\/uploads\/2024\/10\/cynomi.png\" alt=\"\" height=\"78\" width=\"113\" \/><\/div><\/div><div class=\"gutentor-single-item-content\"><h3 class=\"gutentor-single-item-title\">Cynomi<\/h3><p class=\"gutentor-single-item-desc\">La plateforme vCISO de Cynomi, aliment\u00e9e par l&rsquo;IA, automatise les \u00e9valuations des risques, la gestion de la conformit\u00e9 et les plans de rem\u00e9diation. Con\u00e7ue pour les MSP et MSSP, elle permet de faire \u00e9voluer les services de cybers\u00e9curit\u00e9 sans augmenter les effectifs, am\u00e9liorant ainsi l\u2019efficacit\u00e9 et les revenus r\u00e9currents.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section id=\"section-g-qzfavxe\" class=\"wp-block-gutentor-image-box gutentor-section gutentor-image-wrapper imagebox-template1 has-color-bg has-custom-bg partners-list-block\"><div class=\"grid-container\"><div class=\"grid-row gutentor-grid-item-wrap\"><div class=\"gutentor-grid-column grid-lg-4 grid-md-4 grid-12\"><div class=\"gutentor-single-item gutentor-image gutentor-single-item-0\"><div class=\"gutentor-single-item-wrap\"><div class=\"gutentor-single-item-image-box\"><div class=\"gutentor-image-thumb\"><img loading=\"lazy\" decoding=\"async\" class=\"normal-image\" src=\"https:\/\/staging.threatproof.com\/wp-content\/uploads\/2024\/10\/intruder.png\" alt=\"\" height=\"44\" width=\"188\" \/><\/div><\/div><div class=\"gutentor-single-item-content\"><h3 class=\"gutentor-single-item-title\">Intruder<\/h3><p class=\"gutentor-single-item-desc\">Intruder est sp\u00e9cialis\u00e9 dans l\u2019analyse proactive des vuln\u00e9rabilit\u00e9s et les tests de p\u00e9n\u00e9tration. Sa plateforme bas\u00e9e sur le cloud d\u00e9tecte les failles de s\u00e9curit\u00e9 en temps r\u00e9el, permettant aux entreprises de devancer les menaces avec un minimum d&rsquo;intervention manuelle.<\/p><\/div><\/div><\/div><\/div><div class=\"gutentor-grid-column grid-lg-4 grid-md-4 grid-12\"><div class=\"gutentor-single-item gutentor-image gutentor-single-item-1\"><div class=\"gutentor-single-item-wrap\"><div class=\"gutentor-single-item-image-box\"><div class=\"gutentor-image-thumb\"><img loading=\"lazy\" decoding=\"async\" class=\"normal-image\" src=\"https:\/\/staging.threatproof.com\/wp-content\/uploads\/2024\/10\/stellar.png\" alt=\"\" height=\"67\" width=\"188\" \/><\/div><\/div><div class=\"gutentor-single-item-content\"><h3 class=\"gutentor-single-item-title\">Stellar Cyber<\/h3><p class=\"gutentor-single-item-desc\">Stellar Cyber propose une plateforme Open XDR qui centralise les donn\u00e9es de s\u00e9curit\u00e9 des r\u00e9seaux, des terminaux et des environnements cloud. Gr\u00e2ce \u00e0 ses analyses bas\u00e9es sur l&rsquo;IA, elle permet de d\u00e9tecter et de r\u00e9pondre aux menaces plus rapidement, r\u00e9duisant ainsi la complexit\u00e9 pour les \u00e9quipes SOC.<\/p><\/div><\/div><\/div><\/div><div class=\"gutentor-grid-column grid-lg-4 grid-md-4 grid-12\"><div class=\"gutentor-single-item gutentor-image gutentor-single-item-2\"><div class=\"gutentor-single-item-wrap\"><div class=\"gutentor-single-item-image-box\"><div class=\"gutentor-image-thumb\"><img loading=\"lazy\" decoding=\"async\" class=\"normal-image\" src=\"https:\/\/staging.threatproof.com\/wp-content\/uploads\/2024\/10\/vade.png\" alt=\"\" height=\"67\" width=\"104\" \/><\/div><\/div><div class=\"gutentor-single-item-content\"><h3 class=\"gutentor-single-item-title\">Vade<\/h3><p class=\"gutentor-single-item-desc\">Vade se sp\u00e9cialise dans la s\u00e9curit\u00e9 des e-mails en utilisant l&rsquo;IA pour d\u00e9tecter le phishing, les malwares et le spam. Ses solutions s&rsquo;int\u00e8grent parfaitement \u00e0 Microsoft 365 et \u00e0 d&rsquo;autres plateformes, prot\u00e9geant les entreprises contre les menaces avanc\u00e9es par e-mail.<\/p><\/div><\/div><\/div><\/div><div class=\"gutentor-grid-column grid-lg-4 grid-md-4 grid-12\"><div class=\"gutentor-single-item gutentor-image gutentor-single-item-3\"><div class=\"gutentor-single-item-wrap\"><div class=\"gutentor-single-item-image-box\"><div class=\"gutentor-image-thumb\"><img loading=\"lazy\" decoding=\"async\" class=\"normal-image\" src=\"https:\/\/staging.threatproof.com\/wp-content\/uploads\/2025\/02\/Usecure.webp\" alt=\"\" height=\"144\" width=\"500\" \/><\/div><\/div><div class=\"gutentor-single-item-content\"><h3 class=\"gutentor-single-item-title\">Usecure<\/h3><p class=\"gutentor-single-item-desc\">Usecure propose une formation automatis\u00e9e \u00e0 la sensibilisation \u00e0 la cybers\u00e9curit\u00e9 et des simulations de phishing. Sa plateforme \u00e9duque les employ\u00e9s \u00e0 identifier et att\u00e9nuer les risques, r\u00e9duisant ainsi les erreurs humaines et renfor\u00e7ant la s\u00e9curit\u00e9 des organisations.<\/p><\/div><\/div><\/div><\/div><div class=\"gutentor-grid-column grid-lg-4 grid-md-4 grid-12\"><div class=\"gutentor-single-item gutentor-image gutentor-single-item-4\"><div class=\"gutentor-single-item-wrap\"><div class=\"gutentor-single-item-image-box\"><div class=\"gutentor-image-thumb\"><img loading=\"lazy\" decoding=\"async\" class=\"normal-image\" src=\"https:\/\/staging.threatproof.com\/wp-content\/uploads\/2025\/02\/ThreatLocker.webp\" alt=\"\" height=\"430\" width=\"500\" \/><\/div><\/div><div class=\"gutentor-single-item-content\"><h3 class=\"gutentor-single-item-title\">ThreatLocker<\/h3><p class=\"gutentor-single-item-desc\">ThreatLocker propose une s\u00e9curit\u00e9 des endpoints bas\u00e9e sur le mod\u00e8le Zero Trust gr\u00e2ce au whitelisting des applications et au ringfencing. Ses solutions emp\u00eachent l&rsquo;ex\u00e9cution de logiciels non autoris\u00e9s, garantissant une protection renforc\u00e9e contre les ransomwares et autres menaces.<\/p><\/div><\/div><\/div><\/div><div class=\"gutentor-grid-column grid-lg-4 grid-md-4 grid-12\"><div class=\"gutentor-single-item gutentor-image gutentor-single-item-5\"><div class=\"gutentor-single-item-wrap\"><div class=\"gutentor-single-item-image-box\"><div class=\"gutentor-image-thumb\"><img loading=\"lazy\" decoding=\"async\" class=\"normal-image\" src=\"https:\/\/staging.threatproof.com\/wp-content\/uploads\/2025\/02\/Skyhigh-1.webp\" alt=\"\" height=\"512\" width=\"1024\" \/><\/div><\/div><div class=\"gutentor-single-item-content\"><h3 class=\"gutentor-single-item-title\">Skyhigh<\/h3><p class=\"gutentor-single-item-desc\">Skyhigh Security est sp\u00e9cialis\u00e9 dans la protection des donn\u00e9es cloud, offrant des solutions CASB et SSE. Il s\u00e9curise les applications et les donn\u00e9es cloud, garantissant conformit\u00e9 et visibilit\u00e9 dans les environnements multi-cloud.<\/p><\/div><\/div><\/div><\/div><div class=\"gutentor-grid-column grid-lg-4 grid-md-4 grid-12\"><div class=\"gutentor-single-item gutentor-image gutentor-single-item-6\"><div class=\"gutentor-single-item-wrap\"><div class=\"gutentor-single-item-image-box\"><div class=\"gutentor-image-thumb\"><img loading=\"lazy\" decoding=\"async\" class=\"normal-image\" src=\"https:\/\/staging.threatproof.com\/wp-content\/uploads\/2025\/02\/Threatdown.webp\" alt=\"\" height=\"200\" width=\"890\" \/><\/div><\/div><div class=\"gutentor-single-item-content\"><h3 class=\"gutentor-single-item-title\">ThreatDown<\/h3><p class=\"gutentor-single-item-desc\">ThreatDown simplifie la s\u00e9curit\u00e9 des endpoints avec une pr\u00e9vention, d\u00e9tection et r\u00e9ponse aux menaces unifi\u00e9es. Sa plateforme combine l&rsquo;EDR, la gestion des vuln\u00e9rabilit\u00e9s et la gestion des patches, id\u00e9ale pour les \u00e9quipes avec des ressources limit\u00e9es.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"class_list":["post-486","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Partenaires - Threatproof<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez notre r\u00e9seau de partenaires et offrez l\u2019excellence en cybers\u00e9curit\u00e9 \u00e0 vos clients. \ud83e\udd1d Devenez partenaire.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/staging.threatproof.com\/fr\/partenaires\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Partenaires - Threatproof\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez notre r\u00e9seau de partenaires et offrez l\u2019excellence en cybers\u00e9curit\u00e9 \u00e0 vos clients. \ud83e\udd1d Devenez partenaire.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.threatproof.com\/fr\/partenaires\/\" \/>\n<meta property=\"og:site_name\" content=\"Threatproof\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-14T09:51:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/staging.threatproof.com\/wp-content\/uploads\/2025\/02\/logo-acronis.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/partenaires\\\/\",\"url\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/partenaires\\\/\",\"name\":\"Partenaires - Threatproof\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/partenaires\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/partenaires\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/staging.threatproof.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/logo-acronis.png\",\"datePublished\":\"2024-10-10T14:09:44+00:00\",\"dateModified\":\"2025-02-14T09:51:26+00:00\",\"description\":\"D\u00e9couvrez notre r\u00e9seau de partenaires et offrez l\u2019excellence en cybers\u00e9curit\u00e9 \u00e0 vos clients. \ud83e\udd1d Devenez partenaire.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/partenaires\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/partenaires\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/partenaires\\\/#primaryimage\",\"url\":\"https:\\\/\\\/staging.threatproof.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/logo-acronis.png\",\"contentUrl\":\"https:\\\/\\\/staging.threatproof.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/logo-acronis.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/partenaires\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Partenaires\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/\",\"name\":\"Threatproof\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Partenaires - Threatproof","description":"D\u00e9couvrez notre r\u00e9seau de partenaires et offrez l\u2019excellence en cybers\u00e9curit\u00e9 \u00e0 vos clients. \ud83e\udd1d Devenez partenaire.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/staging.threatproof.com\/fr\/partenaires\/","og_locale":"fr_FR","og_type":"article","og_title":"Partenaires - Threatproof","og_description":"D\u00e9couvrez notre r\u00e9seau de partenaires et offrez l\u2019excellence en cybers\u00e9curit\u00e9 \u00e0 vos clients. \ud83e\udd1d Devenez partenaire.","og_url":"https:\/\/staging.threatproof.com\/fr\/partenaires\/","og_site_name":"Threatproof","article_modified_time":"2025-02-14T09:51:26+00:00","og_image":[{"url":"https:\/\/staging.threatproof.com\/wp-content\/uploads\/2025\/02\/logo-acronis.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/staging.threatproof.com\/fr\/partenaires\/","url":"https:\/\/staging.threatproof.com\/fr\/partenaires\/","name":"Partenaires - Threatproof","isPartOf":{"@id":"https:\/\/staging.threatproof.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/staging.threatproof.com\/fr\/partenaires\/#primaryimage"},"image":{"@id":"https:\/\/staging.threatproof.com\/fr\/partenaires\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.threatproof.com\/wp-content\/uploads\/2025\/02\/logo-acronis.png","datePublished":"2024-10-10T14:09:44+00:00","dateModified":"2025-02-14T09:51:26+00:00","description":"D\u00e9couvrez notre r\u00e9seau de partenaires et offrez l\u2019excellence en cybers\u00e9curit\u00e9 \u00e0 vos clients. \ud83e\udd1d Devenez partenaire.","breadcrumb":{"@id":"https:\/\/staging.threatproof.com\/fr\/partenaires\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.threatproof.com\/fr\/partenaires\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/staging.threatproof.com\/fr\/partenaires\/#primaryimage","url":"https:\/\/staging.threatproof.com\/wp-content\/uploads\/2025\/02\/logo-acronis.png","contentUrl":"https:\/\/staging.threatproof.com\/wp-content\/uploads\/2025\/02\/logo-acronis.png"},{"@type":"BreadcrumbList","@id":"https:\/\/staging.threatproof.com\/fr\/partenaires\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging.threatproof.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Partenaires"}]},{"@type":"WebSite","@id":"https:\/\/staging.threatproof.com\/fr\/#website","url":"https:\/\/staging.threatproof.com\/fr\/","name":"Threatproof","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.threatproof.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/staging.threatproof.com\/fr\/wp-json\/wp\/v2\/pages\/486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.threatproof.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/staging.threatproof.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/staging.threatproof.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.threatproof.com\/fr\/wp-json\/wp\/v2\/comments?post=486"}],"version-history":[{"count":3,"href":"https:\/\/staging.threatproof.com\/fr\/wp-json\/wp\/v2\/pages\/486\/revisions"}],"predecessor-version":[{"id":2022,"href":"https:\/\/staging.threatproof.com\/fr\/wp-json\/wp\/v2\/pages\/486\/revisions\/2022"}],"wp:attachment":[{"href":"https:\/\/staging.threatproof.com\/fr\/wp-json\/wp\/v2\/media?parent=486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}