{"id":10425,"date":"2018-03-15T09:59:28","date_gmt":"2018-03-15T08:59:28","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=10425\/"},"modified":"2019-12-31T14:19:56","modified_gmt":"2019-12-31T13:19:56","slug":"edr-nouveau-challenger-dans-la-protection-des-endpoints","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/","title":{"rendered":"EDR : Nouveau challenger dans la protection des endpoints"},"content":{"rendered":"<p><em>Face \u00e0 l\u2019\u00e9volution des menaces visant les entreprises, les strat\u00e9gies de d\u00e9fense s\u2019efforcent en permanence de s\u2019adapter \u00e0 de nouveaux modes d\u2019attaque. Au c\u0153ur de cette d\u00e9fense, les postes de travail et les serveurs repr\u00e9sentent deux des plus grandes sources de vuln\u00e9rabilit\u00e9 et sont r\u00e9guli\u00e8rement \u00e0 l\u2019origine d\u2019intrusions rep\u00e9r\u00e9es plusieurs mois, voire plusieurs ann\u00e9es apr\u00e8s leur r\u00e9alisation.<\/em><\/p>\n<p><em>Face \u00e0 cela, les outils historiques ne semblent pourtant que trop peu adapt\u00e9s aux nouvelles menaces, de plus en plus volatiles (40% des attaques ne s\u2019appuient sur aucun fichier d\u00e9pos\u00e9 sur un poste compromis, d\u2019apr\u00e8s une \u00e9tude de l\u2019institut Ponemon pour Barkly). En cons\u00e9quence, un nouveau type de solution de s\u00e9curit\u00e9 est apparu, m\u00ealant efficacit\u00e9 de d\u00e9tection et rem\u00e9diation adaptative, les <strong>Endpoint Detection &amp; Response<\/strong> (EDR).<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2>AUX ORIGINES\u00a0: LES ANTIVIRUS<\/h2>\n<p>A l\u2019heure du <a href=\"https:\/\/www.computerhope.com\/people\/bernd_fix.htm\">trenti\u00e8me anniversaire de la premi\u00e8re annonce de neutralisation d\u2019un virus<\/a>, les antivirus figurent aujourd\u2019hui parmi les solutions les plus utilis\u00e9es dans la protection des \u00e9quipements terminaux que sont les serveurs et les postes de travail. Seulement, de nouvelles strat\u00e9gies de d\u00e9fense viennent aujourd\u2019hui consolider les fortifications de nos syst\u00e8mes d\u2019information, afin de faire face \u00e0 un spectre plus large d\u2019attaques et de menaces.<\/p>\n<h3>Une r\u00e9ponse toujours n\u00e9cessaire face aux attaques connues<\/h3>\n<p>Que ce soit pour nettoyer un support de stockage USB ou un serveur critique, les antivirus b\u00e9n\u00e9ficient d\u2019une r\u00e9putation d\u2019outils indispensables gr\u00e2ce \u00e0 leur strat\u00e9gie, allant de la d\u00e9tection de fichiers \u00e0 <strong>signatures virales connues <\/strong>\u00e0 la rem\u00e9diation, ainsi qu\u2019\u00e0 leur <strong>faible taux de faux-positif<\/strong>.<\/p>\n<p>Aujourd\u2019hui largement employ\u00e9s par l\u2019ensemble des acteurs num\u00e9riques, certains antivirus efficaces permettent un <strong>investissement minime<\/strong> face \u00e0 des cons\u00e9quences majeures. Pour exemple, les co\u00fbts de l\u2019attaque massive Wannacry sont estim\u00e9s \u00e0 pr\u00e8s d\u2019un milliard de dollars\u00a0&#8211; <a href=\"https:\/\/www.lloyds.com\/news-and-risk-insight\/risk-reports\/library\/technology\/countingthecost\">mais la somme aurait pu \u00eatre beaucoup plus \u00e9lev\u00e9e<\/a>. En effet, comme l\u2019a d\u00e9montr\u00e9 le groupe de recherche MRG Effitas, certains antivirus peuvent bloquer les attaques les plus notables \u00e9manant de la faille <strong>EternalBlue<\/strong>, par d\u00e9tection de signatures au travers du r\u00e9seau.<\/p>\n<p>Partant de ce constat, certaines solutions antivirales semblent r\u00e9pondre \u00e0 la majorit\u00e9 des attentes d\u2019une entreprise \u00ab\u00a0connect\u00e9e\u00a0\u00bb, \u00e0 savoir d\u00e9tecter les menaces les plus massives. Cependant, la recrudescence des <strong>attaques cibl\u00e9es et sur-mesure<\/strong> laisse envisager une banalisation du contournement de ces d\u00e9fenses traditionnelles. Ces attaques peuvent conduire \u00e0 une intrusion dans les \u00a0syst\u00e8mes d\u2019information les plus critiques, dans un environnement o\u00f9 le nombre d\u2019infrastructures augmente et devient par cons\u00e9quent plus complexe \u00e0 maitriser. De plus, l\u2019efficacit\u00e9 des antivirus reste d\u00e9pendante de la multiplicit\u00e9 des attaques, et par cons\u00e9quent d\u2019une r\u00e9colte efficace et compl\u00e8te des signatures virales.<\/p>\n<h3>Des m\u00e9canismes insuffisants face \u00e0 l\u2019\u00e9volutivit\u00e9 des cyber attaquants<\/h3>\n<p>Deux limites sont aujourd\u2019hui mises en cause pour juger de la l\u00e9gitimit\u00e9 des antivirus \u00e0 l\u2019avenir. Elles sont majoritairement li\u00e9es \u00e0 la collecte et au stockage des bases antivirales perp\u00e9tuellement aliment\u00e9es.<\/p>\n<ol>\n<li><strong>Le d\u00e9lai de mise \u00e0 jour des bases virales<br \/>\n<\/strong>Dans un environnement constamment model\u00e9 par les cyber-attaquants, une premi\u00e8re limite est la dur\u00e9e de mise \u00e0 jour des banques de signatures virales. Comme <a href=\"http:\/\/www.lemagit.fr\/actualites\/450297000\/VirusTotal-pas-de-comparaison-mais-la-demonstration-de-certaines-limites\">rappel\u00e9 par F-Secure \u00e0 Gartner<\/a>, \u00ab\u00a0il y aura toujours un d\u00e9lai entre l\u2019acquisition d\u2019un \u00e9chantillon, son analyse, et la cr\u00e9ation de la d\u00e9tection\u00a0\u00bb. Il en d\u00e9coule un d\u00e9lai cons\u00e9quent d\u2019alimentation et d\u2019adaptation des bases de signatures, pouvant conduire \u00e0 la d\u00e9tection d\u2019un virus plusieurs jours apr\u00e8s infection.<\/li>\n<\/ol>\n<ol start=\"2\">\n<li><strong>Une d\u00e9tection principalement bas\u00e9e sur la recherche d\u2019attaques connues<br \/>\n<\/strong>Les attaques de type zero-day se caract\u00e9risent par l\u2019absence de publication et de r\u00e9ponse connue \u00e0 leur encontre, souvent due \u00e0 leur r\u00e9cente r\u00e9alisation. Pouvant pourtant partager des comportements avec des attaques connues, elles ne figurent pas dans le p\u00e9rim\u00e8tre de d\u00e9tection des antivirus. Et bien que des m\u00e9canismes IDS (Intrusion Detection System) et de machine learning se soient greff\u00e9s afin d\u2019\u00e9largir les comportements d\u00e9tect\u00e9s, ceux-ci ne repr\u00e9sentent que peu de challenge pour un attaquant et sont potentiellement sources de faux-positifs.<\/li>\n<\/ol>\n<p>En d\u00e9finitive, aucun attaquant cens\u00e9 ne s\u2019est jamais entendu dire\u00a0:<\/p>\n<p style=\"text-align: center;\"><strong><em>\u201cD*mn there is an antivirus\u2026 <\/em><\/strong><strong><em>Oh well too bad\u2026\u201d<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h1>Mais comment se pr\u00e9munir face a ces attaques\u00a0?<\/h1>\n<p>Annonc\u00e9e en pr\u00e9ambule, la technologie EDR fait son apparition en 2013 et fonde sa strat\u00e9gie sur la pr\u00e9vention d\u2019attaques avanc\u00e9es, via l\u2019utilisation de sch\u00e9mas de compromission connus. Pour cela, la cl\u00e9 de l\u2019efficacit\u00e9 d\u2019un EDR se trouve dans la collecte d\u2019un maximum d\u2019informations en continu.<\/p>\n<p>A travers ses fonctions principales, un outil de <em>Endpoint Detection and Response<\/em> r\u00e9pond \u00e0 trois besoins majeurs des \u00e9quipes de s\u00e9curit\u00e9 des entreprises\u00a0:<\/p>\n<p style=\"text-align: center;\"><strong><em>1.D\u00e9tection\u00a0 \u00a0 2.Investigation\u00a0 \u00a03. Rem\u00e9diation<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Voici ci-dessous une vue globale des fonctionnalit\u00e9s possibles\u00a0:<\/p>\n<ul>\n<li><strong>Une d\u00e9tection intelligente en temps-r\u00e9el\u00a0<\/strong>:<\/li>\n<\/ul>\n<figure id=\"post-10426 media-10426\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10426 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/image-1.png\" alt=\"\" width=\"1066\" height=\"342\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/image-1.png 1066w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/image-1-437x140.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/image-1-768x246.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/image-1-71x23.png 71w\" sizes=\"auto, (max-width: 1066px) 100vw, 1066px\" \/><\/figure>\n<ul>\n<li><strong>Une investigation intuitive\u00a0et compl\u00e8te <\/strong>:\n<ul>\n<li>Recherche exhaustive d\u2019<strong>indicateurs de compromission<\/strong> (IOC) sur l\u2019ensemble des \u00e9quipements terminaux\u00a0distants\u00a0(hash, nom de fichiers, date de cr\u00e9ation, taille, autres attributs) ;<\/li>\n<li><strong>Timeline (ou Kill-Chain)<\/strong> des \u00e9v\u00e8nements d\u00e9roul\u00e9s lors d\u2019une attaque. Elle peut contenir des informations relatives aux <strong>augmentations de privil\u00e8ges<\/strong>, aux <strong>escalades horizontales<\/strong> (ex\u00e9cution sur des machines tierces), etc.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Le d\u00e9tail d\u2019un fichier peut \u00eatre repr\u00e9sent\u00e9 comme suit\u00a0:<\/p>\n<figure id=\"post-10428 media-10428\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10428 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/image-2.png\" alt=\"\" width=\"900\" height=\"281\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/image-2.png 900w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/image-2-437x136.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/image-2-768x240.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/image-2-71x22.png 71w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/figure>\n<ul>\n<li><strong>Une rem\u00e9diation automatique ou sur demande<\/strong> :<\/li>\n<\/ul>\n<p>Dans l\u2019objectif de prioriser les interventions des \u00e9quipes de s\u00e9curit\u00e9, des m\u00e9canismes de <strong>scoring de la criticit\u00e9<\/strong> des alertes permettent aux op\u00e9rateurs de hi\u00e9rarchiser les actions. Et, m\u00eame si la suppression automatique de processus malveillants permet une premi\u00e8re rem\u00e9diation facile, d\u2019autres rem\u00e9diations \u00ab\u00a0on-demand\u00a0\u00bb et r\u00e9alisables \u00e0 distance sont envisageables\u00a0:<\/p>\n<figure id=\"post-10430 media-10430\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10430\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Image-3-377x191.png\" alt=\"\" width=\"547\" height=\"277\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Image-3-377x191.png 377w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Image-3-71x36.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Image-3.png 630w\" sizes=\"auto, (max-width: 547px) 100vw, 547px\" \/><\/figure>\n<p>A noter que les m\u00e9canismes pr\u00e9sent\u00e9s ci-dessus ne sont pas forc\u00e9ment pr\u00e9sents dans toutes les solutions se pr\u00e9sentant comme EDR. La pr\u00e9sence d\u2019un antivirus int\u00e9gr\u00e9 n\u2019est par exemple pas une garantie, tant l\u2019efficacit\u00e9 des autres m\u00e9canismes de d\u00e9tection s\u2019acc\u00e9l\u00e8re et permet des performances de d\u00e9tection \u00e9quivalentes.<\/p>\n<p>Suivant le niveau de maturit\u00e9 de chaque solution, il est par cons\u00e9quent n\u00e9cessaire d\u2019adopter une strat\u00e9gie r\u00e9alis\u00e9e sur-mesure en regard des ressources mat\u00e9rielles\/logicielles, des donn\u00e9es m\u00e9tier \u00e0 prot\u00e9ger et des ressources financi\u00e8res mobilisables.<\/p>\n<p>&nbsp;<\/p>\n<h2>Contextualisation pour une strategie sur-mesure<\/h2>\n<h3>Une combinaison entre solutions historiques et innovantes<\/h3>\n<p>Puisque les EDR permettent la coexistence d\u2019autres solutions de pr\u00e9vention, il n\u2019est pas n\u00e9cessaire de se s\u00e9parer de son actuel antivirus afin de compl\u00e9ter ses d\u00e9fenses. Pour autant, l\u2019aspect financier du maintien de deux solutions distinctes sur le m\u00eame p\u00e9rim\u00e8tre peut \u00eatre un handicap.<\/p>\n<p>De plus, certains EDR peuvent aussi int\u00e9grer des antivirus raisonnables, qui deviennent d\u2019autant plus efficaces dans l\u2019investigation des \u00e9v\u00e8nements lorsqu\u2019ils sont li\u00e9s \u00e0 la m\u00eame console de supervision. A l\u2019inverse, plusieurs acteurs de solutions antivirales essayent de faire migrer leur solution vers les technologies EDR, ceci afin d\u2019alimenter leur offre de protection Endpoint.<\/p>\n<p>En se concentrant sur des sc\u00e9narios adressables par la technologie EDR, nous pouvons noter la pr\u00e9sence de solutions permettant :<\/p>\n<ol>\n<li>L\u2019utilisation d\u2019une <strong>console d\u2019investigation et de rem\u00e9diation centralis\u00e9e<\/strong> et permettant la <strong>protection de sites distants<\/strong><\/li>\n<li>L\u2019interfa\u00e7age avec un <strong>SIEM<\/strong> ou des outils d\u2019authentification (type <strong>Active Directory<\/strong>)<\/li>\n<li>La restauration d\u2019un OS infect\u00e9 par un <strong>ransomware<\/strong> vers un \u00e9tat sain<\/li>\n<li>L\u2019adaptation de la rem\u00e9diation op\u00e9r\u00e9e, afin qu\u2019elle soit <strong>automatique<\/strong> ou <strong>manuelle<\/strong><\/li>\n<\/ol>\n<h3>Des points de vigilance \u00e0 adresser<\/h3>\n<p>Pour autant, un EDR n\u2019est pas \u00e0 consid\u00e9rer comme une solution miracle\u00a0car :<\/p>\n<ul>\n<li><strong>Il peut devenir destructeur entre de mauvaises mains<\/strong>, ce qui n\u00e9cessite notamment un durcissement de configuration, une revue de la gestion des acc\u00e8s ou encore une proc\u00e9dure de patch management\u00a0;<\/li>\n<li><strong>Certains m\u00e9canismes de contournement sont possibles<\/strong>, Wannacry en est un exemple via son utilisation d\u2019un m\u00e9canisme de d\u00e9tection d\u2019un environnement sandbox. Si une sandbox \u00e9tait utilis\u00e9e pour l\u2019ex\u00e9cuter, le virus retardait le lancement de son attaque\u00a0(le temps que se d\u00e9roulent les analyses de protection) afin de contourner la d\u00e9fense ;<\/li>\n<li><strong>Il repr\u00e9sente une potentielle surface d\u2019attaque suppl\u00e9mentaire<\/strong>, avec ses propres vuln\u00e9rabilit\u00e9s logicielles, en raison par exemple du besoin de privil\u00e8ges \u00e9lev\u00e9s des agents d\u00e9ploy\u00e9s sur les postes.<\/li>\n<\/ul>\n<h3 style=\"text-align: left;\">\u00ab\u00a0En 2019, les fonctionnalit\u00e9s des antivirus et des EDR auront fusionn\u00e9 dans une seule et m\u00eame offre\u00a0\u00bb (Gartner)<\/h3>\n<p>L\u2019int\u00e9r\u00eat que repr\u00e9sentent les EDR n\u2019est pas anodin, comme partag\u00e9 dans une \u00e9tude Gartner pr\u00e9disant la fusion de leurs m\u00e9canismes de d\u00e9tection, d\u2019investigation et de rem\u00e9diation avec un socle plus mature, celui des antivirus\u00a0(source :\u00a0Gartner, \u00ab Magic Quadrant for Endpoint Protection Platforms 2017 \u00bb, 2017), \u00e0 partir de 2019.<\/p>\n<p>Le chiffre d\u2019affaires g\u00e9n\u00e9r\u00e9 par le march\u00e9 des EDR a doubl\u00e9 entre 2015 et 2016. L\u2019int\u00e9r\u00eat grandissant de ce domaine d\u2019innovation laisse pr\u00e9dire, selon Gartner, une croissance annuelle de pr\u00e8s de 50% du chiffre d\u2019affaires global li\u00e9 aux EDR jusqu\u2019en 2020.<\/p>\n<p>Actuellement pr\u00e9sent sur pr\u00e8s de 5% de l\u2019ensemble des \u00e9quipements compatibles, ce nouvel outil \u00e0 la mode semble pr\u00e9dispos\u00e9 \u00e0 davantage de r\u00e9sonnance dans les strat\u00e9gies de protection de nos postes de travail, de serveurs mais aussi de nos smartphones.<\/p>\n<p>&nbsp;<\/p>\n<h2>Les \u00e9diteurs<\/h2>\n<p>Une liste -non exhaustive- d\u2019acteurs du monde des EDR est renseign\u00e9e \u00e0 titre indicatif ci-dessous.<\/p>\n<figure id=\"post-10432 media-10432\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10432 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/image-4.png\" alt=\"\" width=\"762\" height=\"366\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/image-4.png 762w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/image-4-398x191.png 398w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/image-4-71x34.png 71w\" sizes=\"auto, (max-width: 762px) 100vw, 762px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Face \u00e0 l\u2019\u00e9volution des menaces visant les entreprises, les strat\u00e9gies de d\u00e9fense s\u2019efforcent en permanence de s\u2019adapter \u00e0 de nouveaux modes d\u2019attaque. Au c\u0153ur de cette d\u00e9fense, les postes de travail et les serveurs repr\u00e9sentent deux des plus grandes sources&#8230;<\/p>\n","protected":false},"author":1308,"featured_media":10437,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[1148,1241,2885,2929,2930,2933,3302],"coauthors":[2934],"class_list":["post-10425","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-antivirus","tag-cyberattaque","tag-detection","tag-edr","tag-endpoint","tag-mitigation","tag-security-architecture"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EDR : Nouveau challenger dans la protection des endpoints - RiskInsight<\/title>\n<meta name=\"description\" content=\"Face \u00e0 l\u2019\u00e9volution des menaces visant les entreprises, les strat\u00e9gies de d\u00e9fense s\u2019efforcent en permanence de s\u2019adapter \u00e0 de nouveaux modes d\u2019attaque.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EDR : Nouveau challenger dans la protection des endpoints - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Face \u00e0 l\u2019\u00e9volution des menaces visant les entreprises, les strat\u00e9gies de d\u00e9fense s\u2019efforcent en permanence de s\u2019adapter \u00e0 de nouveaux modes d\u2019attaque.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-15T08:59:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T13:19:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Fotolia_81973304_Subscription_Monthly_XXL.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"4724\" \/>\n\t<meta property=\"og:image:height\" content=\"4724\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Antonin Apperce\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Antonin Apperce\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/\"},\"author\":{\"name\":\"Antonin Apperce\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f510c3388701338fca3342d735376d3e\"},\"headline\":\"EDR : Nouveau challenger dans la protection des endpoints\",\"datePublished\":\"2018-03-15T08:59:28+00:00\",\"dateModified\":\"2019-12-31T13:19:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/\"},\"wordCount\":1669,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Fotolia_81973304_Subscription_Monthly_XXL.jpg\",\"keywords\":[\"antivirus\",\"Cyberattaque\",\"d\u00e9tection\",\"EDR\",\"endpoint\",\"mitigation\",\"security architecture\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/\",\"name\":\"EDR : Nouveau challenger dans la protection des endpoints - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Fotolia_81973304_Subscription_Monthly_XXL.jpg\",\"datePublished\":\"2018-03-15T08:59:28+00:00\",\"dateModified\":\"2019-12-31T13:19:56+00:00\",\"description\":\"Face \u00e0 l\u2019\u00e9volution des menaces visant les entreprises, les strat\u00e9gies de d\u00e9fense s\u2019efforcent en permanence de s\u2019adapter \u00e0 de nouveaux modes d\u2019attaque.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Fotolia_81973304_Subscription_Monthly_XXL.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Fotolia_81973304_Subscription_Monthly_XXL.jpg\",\"width\":4724,\"height\":4724,\"caption\":\"Flat modern design with shadow rating increase\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EDR : Nouveau challenger dans la protection des endpoints\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f510c3388701338fca3342d735376d3e\",\"name\":\"Antonin Apperce\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/antonin-apperce\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EDR : Nouveau challenger dans la protection des endpoints - RiskInsight","description":"Face \u00e0 l\u2019\u00e9volution des menaces visant les entreprises, les strat\u00e9gies de d\u00e9fense s\u2019efforcent en permanence de s\u2019adapter \u00e0 de nouveaux modes d\u2019attaque.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/","og_locale":"en_US","og_type":"article","og_title":"EDR : Nouveau challenger dans la protection des endpoints - RiskInsight","og_description":"Face \u00e0 l\u2019\u00e9volution des menaces visant les entreprises, les strat\u00e9gies de d\u00e9fense s\u2019efforcent en permanence de s\u2019adapter \u00e0 de nouveaux modes d\u2019attaque.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/","og_site_name":"RiskInsight","article_published_time":"2018-03-15T08:59:28+00:00","article_modified_time":"2019-12-31T13:19:56+00:00","og_image":[{"width":4724,"height":4724,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Fotolia_81973304_Subscription_Monthly_XXL.jpg","type":"image\/jpeg"}],"author":"Antonin Apperce","twitter_misc":{"Written by":"Antonin Apperce","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/"},"author":{"name":"Antonin Apperce","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f510c3388701338fca3342d735376d3e"},"headline":"EDR : Nouveau challenger dans la protection des endpoints","datePublished":"2018-03-15T08:59:28+00:00","dateModified":"2019-12-31T13:19:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/"},"wordCount":1669,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Fotolia_81973304_Subscription_Monthly_XXL.jpg","keywords":["antivirus","Cyberattaque","d\u00e9tection","EDR","endpoint","mitigation","security architecture"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/","url":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/","name":"EDR : Nouveau challenger dans la protection des endpoints - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Fotolia_81973304_Subscription_Monthly_XXL.jpg","datePublished":"2018-03-15T08:59:28+00:00","dateModified":"2019-12-31T13:19:56+00:00","description":"Face \u00e0 l\u2019\u00e9volution des menaces visant les entreprises, les strat\u00e9gies de d\u00e9fense s\u2019efforcent en permanence de s\u2019adapter \u00e0 de nouveaux modes d\u2019attaque.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Fotolia_81973304_Subscription_Monthly_XXL.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Fotolia_81973304_Subscription_Monthly_XXL.jpg","width":4724,"height":4724,"caption":"Flat modern design with shadow rating increase"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"EDR : Nouveau challenger dans la protection des endpoints"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f510c3388701338fca3342d735376d3e","name":"Antonin Apperce","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/antonin-apperce\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1308"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=10425"}],"version-history":[{"count":7,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10425\/revisions"}],"predecessor-version":[{"id":10442,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10425\/revisions\/10442"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/10437"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=10425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=10425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=10425"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=10425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}