{"id":17798,"date":"2023-05-16T19:17:33","date_gmt":"2023-05-16T19:17:33","guid":{"rendered":"https:\/\/www.sonatus.com\/sonatus-foundation\/services-de-securite\/"},"modified":"2024-11-25T05:37:18","modified_gmt":"2024-11-25T05:37:18","slug":"services-de-securite","status":"publish","type":"page","link":"https:\/\/www.sonatus.com\/fr\/sonatus-foundation\/services-de-securite\/","title":{"rendered":"Services de s\u00e9curit\u00e9"},"content":{"rendered":"<section class=\"wpb-content-wrapper\">[vc_row full_width=&#8221;stretch_row&#8221; typography_style=&#8221;white&#8221; el_class=&#8221;vc-hero vc-hero&#8211;graphic-overlay vc-hero&#8211;services&#8221; css=&#8221;.vc_custom_1685551448203{background-color: #001F60 !important;}&#8221;][vc_column el_class=&#8221;vc-hero__heading-col&#8221; css=&#8221;.vc_custom_1685122146217{margin-bottom: 0px !important;}&#8221;]<h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-text-2xl wpex-font-normal vc_custom_1685555567009 label\"><span class=\"vcex-heading-inner wpex-inline-block\">Services de s\u00e9curit\u00e9 de Sonatus&nbsp;Foundation<\/span><\/h2><style>.vcex-heading.vcex_69e4ecdd68ce4{width:840px;}<\/style><h1 class=\"vcex-heading vcex-heading-plain vcex-module wpex-text-2xl wpex-font-normal wpex-max-w-100 wpex-mr-auto vc-hero__heading vcex_69e4ecdd68ce4\"><span class=\"vcex-heading-inner wpex-inline-block\">Prot\u00e9ger les r\u00e9seaux de v\u00e9hicules<br \/>\net les h\u00f4tes<\/span><\/h1>[\/vc_column][vc_column el_class=&#8221;vc-hero__content-col&#8221; offset=&#8221;vc_col-md-4&#8243;][vc_column_text align=&#8221;left&#8221; el_class=&#8221;vc-hero__content text-lg&#8221; width=&#8221;520px&#8221; css=&#8221;.vc_custom_1725983249509{margin-bottom: 30px !important;}&#8221;]Les voitures connect\u00e9es sont plus vuln\u00e9rables aux risques de cybers\u00e9curit\u00e9. D\u00e9tectez et pr\u00e9venez les menaces pour les r\u00e9seaux embarqu\u00e9s et prot\u00e9gez les ECU des intrusions et des fuites de donn\u00e9es avec des politiques de surveillance et d\u2019att\u00e9nuation des risques hautement configurables.[\/vc_column_text][\/vc_column][vc_column el_class=&#8221;vc-hero__media-col&#8221; offset=&#8221;vc_col-md-8&#8243; css=&#8221;.vc_custom_1685122222732{margin-bottom: 0px !important;}&#8221;][vc_row_inner el_class=&#8221;vc-hero__media-wrap&#8221; css=&#8221;.vc_custom_1684960189422{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1684960195627{margin-bottom: 0px !important;}&#8221;]<figure class=\"vcex-image vcex-module vc-hero__overlay\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img loading=\"lazy\" decoding=\"async\" width=\"1139\" height=\"527\" src=\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/services-security.svg\" class=\"vcex-image-img wpex-align-middle skip-lazy\" alt=\"\" \/><\/div><\/figure><figure class=\"vcex-image vcex-module vc-hero__media\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img loading=\"lazy\" decoding=\"async\" width=\"1139\" height=\"527\" src=\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/services-car-wireframe-render.png\" class=\"vcex-image-img wpex-align-middle skip-lazy\" alt=\"\" srcset=\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/services-car-wireframe-render.png 1139w, https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/services-car-wireframe-render-300x139.png 300w, https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/services-car-wireframe-render-1024x474.png 1024w, https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/services-car-wireframe-render-768x355.png 768w\" sizes=\"auto, (max-width: 1139px) 100vw, 1139px\" \/><\/div><\/figure>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;vc-content-expand u-padding-top&#8211;xl&#8221;][vc_column width=&#8221;5\/6&#8243;]<div class=\"vcex-module vcex-icon-box vcex-icon-box-one wpex-flex vcex-icon-box-wo-icon wpex-text-left vc_custom_1685640756854 vc-content-expand__image-heading\"><div class=\"vcex-icon-box-text wpex-flex-grow\"><h2 class=\"vcex-icon-box-heading wpex-heading wpex-text-md wpex-mb-10\">UIDPS<\/h2><\/div><\/div>[vc_column_text css=&#8221;.vc_custom_1725988691642{margin-bottom: 20px !important;}&#8221;]De plus en plus, l\u2019industrie automobile d\u00e9ploie des syst\u00e8mes de gestion de la cybers\u00e9curit\u00e9 des v\u00e9hicules pour prot\u00e9ger les v\u00e9hicules connect\u00e9s contre les intrusions, le piratage, les logiciels malveillants, les fuites de donn\u00e9es et les autres cybermenaces. Dans de nombreuses juridictions, les constructeurs automobiles doivent respecter de nouvelles r\u00e9glementations sur les v\u00e9hicules pour les prot\u00e9ger des menaces externes, et de nouvelles lois sur la protection des donn\u00e9es sensibles.<\/p>\n<p>Pour att\u00e9nuer ces risques de cybers\u00e9curit\u00e9, les voitures connect\u00e9es ont besoin de syst\u00e8mes de gestion de la cybers\u00e9curit\u00e9 \u00e0 plusieurs niveaux. Parmi ces niveaux, la protection des r\u00e9seaux dans les v\u00e9hicules connect\u00e9s est essentielle. Le syst\u00e8me unifi\u00e9 de d\u00e9tection et de pr\u00e9vention des intrusions (Unified Intrusion Detection and Prevention System, UIDPS) de Sonatus fonctionne sur les r\u00e9seaux CAN et Ethernet d\u2019un v\u00e9hicule, afin d\u2019att\u00e9nuer les risques de cybers\u00e9curit\u00e9 et d\u2019appliquer des protocoles de s\u00e9curit\u00e9 des donn\u00e9es aux r\u00e9seaux du v\u00e9hicule.<\/p>\n<h3><span style=\"font-size: 28px;\">Avantages<\/span><\/h3>\n<ul class=\"orange-dots\">\n<li>Tr\u00e8s adaptable aux menaces nouvelles et \u00e9mergentes<\/li>\n<li>Isole les donn\u00e9es sensibles pour pr\u00e9venir les fuites de donn\u00e9es<\/li>\n<li>Compl\u00e9mentaire aux solutions de s\u00e9curit\u00e9 cloud tierces<\/li>\n<li>Aide \u00e0 r\u00e9duire les rappels li\u00e9s \u00e0 la s\u00e9curit\u00e9<\/li>\n<li>R\u00e9glable en fonction de la charge du syst\u00e8me et des facteurs de s\u00e9curit\u00e9<\/li>\n<li>D\u00e9charge l\u2019ECU pour r\u00e9duire l\u2019impact de la surveillance sur les performances<\/li>\n<\/ul>\n<h3><span style=\"font-size: 28px;\">Principales caract\u00e9ristiques techniques<\/span><\/h3>\n<ul class=\"orange-checks\">\n<li>Multi-r\u00e9seau (CAN, Ethernet, donn\u00e9es mobiles, WiFi, etc.) et multi-protocole<\/li>\n<li>Int\u00e9gr\u00e9 au mat\u00e9riel de commutation Ethernet<\/li>\n<li>D\u00e9tection et pr\u00e9vention configurables en fonction de la charge du syst\u00e8me<\/li>\n<li>Capacit\u00e9s d\u2019inspection compl\u00e8tes, y compris l\u2019inspection approfondie des paquets de donn\u00e9es, avec v\u00e9rification par un fournisseur tiers, pour prendre en charge&nbsp;:\n<ul>\n<li>Le trafic et les connexions inconnus<\/li>\n<li>Les fuites de donn\u00e9es et erreurs de protocole<\/li>\n<li>Les attaques de d\u00e9ni de service (DoS, Denial of Service)<\/li>\n<li>Les violations de taux<\/li>\n<li>Les attaques par scan de port<\/li>\n<li>Les attaques diagnostiques<\/li>\n<li>Le retrait de l\u2019ECU<\/li>\n<\/ul>\n<\/li>\n<li>Configurable dynamiquement pour diff\u00e9rents types de menaces pour la s\u00e9curit\u00e9<\/li>\n<li>Appliquer les politiques de d\u00e9tection et d\u2019att\u00e9nuation en temps r\u00e9el<\/li>\n<li>Conforme au R\u00e8glement ONU n\u00b0&nbsp;155 sur la cybers\u00e9curit\u00e9<\/li>\n<\/ul>\n[\/vc_column_text]<div class=\"vcex-toggle vcex-module hidden vc-content-expand__content\" data-animate=\"true\" data-duration=\"300\"><div class=\"vcex-toggle__heading\"><a href=\"#voir-les-dtails\" class=\"vcex-toggle__trigger wpex-flex wpex-items-center wpex-transition-colors wpex-flex-row-reverse\" aria-expanded=\"false\" aria-controls=\"voir-les-dtails\"><div class=\"vcex-toggle__icon wpex-ml-10\" aria-hidden=\"true\"><div class=\"vcex-toggle__icon-open wpex-flex wpex-flex-col wpex-items-center\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1.5em\" viewBox=\"0 0 24 24\" width=\"1.5em\" fill=\"currentColor\"><path d=\"M0 0h24v24H0V0z\" fill=\"none\"\/><path d=\"M24 24H0V0h24v24z\" fill=\"none\" opacity=\".87\"\/><path d=\"M16.59 8.59L12 13.17 7.41 8.59 6 10l6 6 6-6-1.41-1.41z\"\/><\/svg><\/div><div class=\"vcex-toggle__icon-close wpex-flex wpex-flex-col wpex-items-center\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1.5em\" viewBox=\"0 0 24 24\" width=\"1.5em\" fill=\"currentColor\" class=\"vcex-toggle__icon-close\"><path d=\"M0 0h24v24H0V0z\" fill=\"none\"\/><path d=\"M12 8l-6 6 1.41 1.41L12 10.83l4.59 4.58L18 14l-6-6z\"\/><\/svg><\/div><\/div><div class=\"vcex-toggle__title wpex-mr-auto\">Voir les d\u00e9tails<\/div><\/a><\/div><div id=\"voir-les-dtails\" class=\"vcex-toggle__content wpex-last-mb-0 wpex-my-10 wpex-clr\">\n<h3>Avantages<\/h3>\n<ul class=\"orange-dots\">\n<li>Tr\u00e8s adaptable aux menaces nouvelles et \u00e9mergentes<\/li>\n<li>Compl\u00e9mentaire aux solutions de s\u00e9curit\u00e9 cloud tierces<\/li>\n<li>Aide \u00e0 r\u00e9duire les rappels li\u00e9s \u00e0 la s\u00e9curit\u00e9<\/li>\n<li>R\u00e9glable en fonction de la charge du syst\u00e8me et des facteurs de s\u00e9curit\u00e9<\/li>\n<li>D\u00e9charge l\u2019ECU pour r\u00e9duire l\u2019impact de la surveillance sur les performances<\/li>\n<\/ul>\n<h3>Principales caract\u00e9ristiques techniques<\/h3>\n<ul class=\"orange-checks\">\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Multi-r\u00e9seau (CAN, Ethernet, donn\u00e9es mobiles, WiFi, etc.) et multi-protocole<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Int\u00e9gr\u00e9 au mat\u00e9riel de commutation Ethernet<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">D\u00e9tection et pr\u00e9vention configurables en fonction de la charge du syst\u00e8me<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Capacit\u00e9s d\u2019inspection compl\u00e8tes, y compris l\u2019inspection approfondie des paquets de donn\u00e9es, avec v\u00e9rification par un fournisseur tiers, pour prendre en charge&nbsp;:<\/span>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Le trafic et les connexions inconnus <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Les fuites de donn\u00e9es et erreurs de protocole<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Les attaques de d\u00e9ni de service (DoS, Denial of Service) <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Les violations de taux <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Les attaques par scan de port <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Les attaques diagnostiques<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Le retrait de l\u2019ECU<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Configurable dynamiquement <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Appliquer les politiques de d\u00e9tection et d\u2019att\u00e9nuation en temps r\u00e9el <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Conforme au R\u00e8glement ONU n\u00b0&nbsp;155 sur la cybers\u00e9curit\u00e9<\/span><\/li>\n<\/ul>\n<\/div><\/div>[\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1696621286268{padding-top: 0px !important;}&#8221; el_class=&#8221;vc-content-expand&#8221; el_id=&#8221;ecu_monitoring&#8221;][vc_column width=&#8221;5\/6&#8243;]<div class=\"vcex-module vcex-icon-box vcex-icon-box-one wpex-flex vcex-icon-box-wo-icon wpex-text-left vc_custom_1685640770893 vc-content-expand__image-heading\"><div class=\"vcex-icon-box-text wpex-flex-grow\"><h2 class=\"vcex-icon-box-heading wpex-heading wpex-text-md wpex-mb-10\">Agent de surveillance de l\u2019ECU<\/h2><\/div><\/div>[vc_column_text css=&#8221;.vc_custom_1732513020714{margin-bottom: 20px !important;}&#8221;]L\u2019agent de surveillance de l\u2019ECU permet aux constructions ou aux fournisseurs de rang 1 de l\u2019industrie automobile de garder une visibilit\u00e9 sur l\u2019infrastructure et les syst\u00e8mes d\u2019exploitation \u00e0 des fins de surveillance de la s\u00e9curit\u00e9 et des performances. Il peut \u00eatre configur\u00e9 pour rechercher un comportement anormal qui pourrait indiquer des cybermenaces ou d\u2019autres probl\u00e8mes avec l\u2019application, et signaler les observations au cloud.<\/p>\n<ul class=\"orange-checks\">\n<li>Interface SQL pour une surveillance d\u00e9taill\u00e9e et la d\u00e9tection des anomalies<\/li>\n<li>Requ\u00eates bas\u00e9es sur les seuils d\u2019activit\u00e9 et les calendriers de l\u2019ECU<\/li>\n<li>Visibilit\u00e9 dans les \u00e9v\u00e9nements OS\/Kernel<\/li>\n<li>Surveillance de l\u2019int\u00e9grit\u00e9 des fichiers<\/li>\n<li>Prise en charge des requ\u00eates diff\u00e9rentielles et instantan\u00e9es<\/li>\n<li>Rapports d\u2019\u00e9v\u00e9nements vers le cloud<\/li>\n<li>Sauvegarde int\u00e9gr\u00e9e pour limiter la consommation de ressources<\/li>\n<li>Enti\u00e8rement configurable<\/li>\n<\/ul>\n[\/vc_column_text]<div class=\"vcex-toggle vcex-module hidden vc-content-expand__content\" data-animate=\"true\" data-duration=\"300\"><div class=\"vcex-toggle__heading\"><a href=\"#voir-les-dtails\" class=\"vcex-toggle__trigger wpex-flex wpex-items-center wpex-transition-colors wpex-flex-row-reverse\" aria-expanded=\"false\" aria-controls=\"voir-les-dtails\"><div class=\"vcex-toggle__icon wpex-ml-10\" aria-hidden=\"true\"><div class=\"vcex-toggle__icon-open wpex-flex wpex-flex-col wpex-items-center\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1.5em\" viewBox=\"0 0 24 24\" width=\"1.5em\" fill=\"currentColor\"><path d=\"M0 0h24v24H0V0z\" fill=\"none\"\/><path d=\"M24 24H0V0h24v24z\" fill=\"none\" opacity=\".87\"\/><path d=\"M16.59 8.59L12 13.17 7.41 8.59 6 10l6 6 6-6-1.41-1.41z\"\/><\/svg><\/div><div class=\"vcex-toggle__icon-close wpex-flex wpex-flex-col wpex-items-center\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1.5em\" viewBox=\"0 0 24 24\" width=\"1.5em\" fill=\"currentColor\" class=\"vcex-toggle__icon-close\"><path d=\"M0 0h24v24H0V0z\" fill=\"none\"\/><path d=\"M12 8l-6 6 1.41 1.41L12 10.83l4.59 4.58L18 14l-6-6z\"\/><\/svg><\/div><\/div><div class=\"vcex-toggle__title wpex-mr-auto\">Voir les d\u00e9tails<\/div><\/a><\/div><div id=\"voir-les-dtails\" class=\"vcex-toggle__content wpex-last-mb-0 wpex-my-10 wpex-clr\">\n<h3>Principales caract\u00e9ristiques techniques<\/h3>\n<ul class=\"orange-checks\">\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Interface SQL pour une surveillance d\u00e9taill\u00e9e et la d\u00e9tection des anomalies <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Requ\u00eates bas\u00e9es sur les seuils d\u2019activit\u00e9 et les calendriers de l\u2019ECU <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Visibilit\u00e9 dans les \u00e9v\u00e9nements OS\/Kernel<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Surveillance de l\u2019int\u00e9grit\u00e9 des fichiers<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Prise en charge des requ\u00eates diff\u00e9rentielles et instantan\u00e9es <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Rapports d\u2019\u00e9v\u00e9nements vers le cloud<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Sauvegarde int\u00e9gr\u00e9e pour limiter la consommation de ressources<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Enti\u00e8rement configurable<\/span><\/li>\n<\/ul>\n<\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1682970964784{background-color: #eceded !important;}&#8221;][vc_column]<h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-text-2xl wpex-font-normal vc_custom_1683822930353\"><span class=\"vcex-heading-inner wpex-inline-block\">Ressources li\u00e9es<\/span><\/h2><style>.vcex_69e4ecdd7211d .wpex-posts-card-carousel{--wpex-carousel-gap:15px;}.vcex_69e4ecdd7211d .wpex-posts-card-carousel{--wpex-carousel-columns:1;}.vcex_69e4ecdd7211d .wpex-posts-card-carousel.wpex-carousel:not(.owl-loaded) > *:not(:nth-child(1n+2)) {display: flex !important;}@media only screen and (min-width: 480px) {.vcex_69e4ecdd7211d .wpex-posts-card-carousel{--wpex-carousel-columns:1;}.vcex_69e4ecdd7211d .wpex-posts-card-carousel.wpex-carousel:not(.owl-loaded) > *:not(:nth-child(1n+2)) {display: flex !important;}}@media only screen and (min-width: 768px) {.vcex_69e4ecdd7211d .wpex-posts-card-carousel{--wpex-carousel-columns:1;}.vcex_69e4ecdd7211d .wpex-posts-card-carousel.wpex-carousel:not(.owl-loaded) > *:not(:nth-child(1n+2)) {display: flex !important;}}@media only screen and (min-width: 960px) {.vcex_69e4ecdd7211d .wpex-posts-card-carousel{--wpex-carousel-columns:1;}.vcex_69e4ecdd7211d .wpex-posts-card-carousel.wpex-carousel:not(.owl-loaded) > *:not(:nth-child(1n+2)) {display: flex !important;}}<\/style><div class=\"wpex-post-cards wpex-post-cards-general-card carousel-overflow carousel-3-col vcex_69e4ecdd7211d wpex-relative\"><div class=\"wpex-post-cards-inner\"><div class=\"wpex-post-cards-loop wpex-posts-card-carousel wpex-carousel owl-carousel wpex-carousel--render-onload wpex-carousel--flex wpex-carousel--no-margins arrwstyle-default\" data-wpex-carousel='{&quot;nav&quot;:&quot;false&quot;,&quot;loop&quot;:&quot;false&quot;,&quot;items&quot;:1,&quot;slideBy&quot;:1,&quot;responsive&quot;:{&quot;0&quot;:{&quot;items&quot;:1},&quot;480&quot;:{&quot;items&quot;:1},&quot;768&quot;:{&quot;items&quot;:1},&quot;960&quot;:{&quot;items&quot;:1}}}'><div class=\"wpex-post-cards-entry post-390 type-post wpex-carousel-slide cat-61 cat-62 post_tag-9 translation_priority-84 author-25\"><div class=\"wpex-card wpex-card-general-card\">\n\n    <div class=\"c-card c-card--general\">\n        <div class=\"c-card__inner\">\n\n                            <div class=\"c-card__media\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"380\" height=\"250\" src=\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/03\/AdobeStock_566300457-380x250.jpeg\" class=\"attachment-press-release-card size-press-release-card wp-post-image\" alt=\"\" \/>                <\/div>\n            \n            <div class=\"c-card__content\">\n                <div class=\"label c-card__type\">Sur notre blog<\/div>\n\n                <h4 class=\"c-card__title\">\n                    <a href=\"https:\/\/www.sonatus.com\/fr\/blog\/data-is-the-new-everything\/\"\n                                               target=\"_self\">\n                        Data is the new\u2026everything<\/a>\n                <\/h4>\n\n                                    <div class=\"c-card__excerpt\">There&#8217;s a common saying these days that &#8220;data is the new oil.\u201d While the sentiment is correct that data is&hellip;<\/div>\n                \n                <div class=\"c-card__cta-wrap\">\n                                        <a href=\"https:\/\/www.sonatus.com\/fr\/blog\/data-is-the-new-everything\/\"\n                       target=\"_self\"\n                       class=\"c-card__cta vcex-button theme-button c-text-button\">\n                        <span class=\"theme-button-inner\">Lire l'article<\/span>\n                    <\/a>\n\n                <\/div>\n\n            <\/div>\n\n        <\/div>\n    <\/div>\n\n\n<\/div><\/div><div class=\"wpex-post-cards-entry post-389 type-post wpex-carousel-slide cat-62 cat-63 post_tag-9 post_tag-13 translation_priority-84 author-26\"><div class=\"wpex-card wpex-card-general-card\">\n\n    <div class=\"c-card c-card--general\">\n        <div class=\"c-card__inner\">\n\n                            <div class=\"c-card__media\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"380\" height=\"250\" src=\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/2023_03_AutomotiveEthernet_1834-380x250.jpg\" class=\"attachment-press-release-card size-press-release-card wp-post-image\" alt=\"Automotive Ethernet Congress 2023 exhibitors\" \/>                <\/div>\n            \n            <div class=\"c-card__content\">\n                <div class=\"label c-card__type\">Sur notre blog<\/div>\n\n                <h4 class=\"c-card__title\">\n                    <a href=\"https:\/\/www.sonatus.com\/fr\/blog\/three-lessons-from-the-2023-automotive-ethernet-congress\/\"\n                                               target=\"_self\">\n                        Three lessons from the 2023 Automotive Ethernet Congress<\/a>\n                <\/h4>\n\n                                    <div class=\"c-card__excerpt\">The importance of network technology in the automotive industry Sonatus attended the Automotive Ethernet Congress in late March in Munich,&hellip;<\/div>\n                \n                <div class=\"c-card__cta-wrap\">\n                                        <a href=\"https:\/\/www.sonatus.com\/fr\/blog\/three-lessons-from-the-2023-automotive-ethernet-congress\/\"\n                       target=\"_self\"\n                       class=\"c-card__cta vcex-button theme-button c-text-button\">\n                        <span class=\"theme-button-inner\">Lire l'article<\/span>\n                    <\/a>\n\n                <\/div>\n\n            <\/div>\n\n        <\/div>\n    <\/div>\n\n\n<\/div><\/div><\/div><\/div><\/div>[\/vc_column][\/vc_row]\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; typography_style=&#8221;white&#8221; el_class=&#8221;vc-hero vc-hero&#8211;graphic-overlay vc-hero&#8211;services&#8221; css=&#8221;.vc_custom_1685551448203{background-color: #001F60 !important;}&#8221;][vc_column el_class=&#8221;vc-hero__heading-col&#8221; css=&#8221;.vc_custom_1685122146217{margin-bottom: 0px !important;}&#8221;][\/vc_column][vc_column el_class=&#8221;vc-hero__content-col&#8221; offset=&#8221;vc_col-md-4&#8243;][vc_column_text align=&#8221;left&#8221; el_class=&#8221;vc-hero__content text-lg&#8221; width=&#8221;520px&#8221; css=&#8221;.vc_custom_1725983249509{margin-bottom:&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":17740,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"class_list":["post-17798","page","type-page","status-publish","hentry","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sonatus\u00a0Foundation\u00a0: services de cybers\u00e9curit\u00e9 | Sonatus<\/title>\n<meta name=\"description\" content=\"D\u00e9tectez et pr\u00e9venez les menaces sur les r\u00e9seaux embarqu\u00e9s et h\u00e9bergez des ECU (Electronic Control Units, unit\u00e9s de contr\u00f4le \u00e9lectronique) avec des politiques de surveillance hautement configurables \u00e0 l\u2019aide des services de s\u00e9curit\u00e9 de Sonatus\u00a0Foundation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sonatus.com\/fr\/sonatus-foundation\/services-de-securite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Services de s\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"D\u00e9tectez et pr\u00e9venez les menaces sur les r\u00e9seaux embarqu\u00e9s et h\u00e9bergez des ECU (Electronic Control Units, unit\u00e9s de contr\u00f4le \u00e9lectronique) avec des politiques de surveillance hautement configurables \u00e0 l\u2019aide des services de s\u00e9curit\u00e9 de Sonatus\u00a0Foundation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sonatus.com\/fr\/sonatus-foundation\/services-de-securite\/\" \/>\n<meta property=\"og:site_name\" content=\"Sonatus\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-25T05:37:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/Sonatus-BlogCard.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sonatus.com\/fr\/sonatus-foundation\/services-de-securite\/\",\"url\":\"https:\/\/www.sonatus.com\/fr\/sonatus-foundation\/services-de-securite\/\",\"name\":\"Sonatus\u00a0Foundation\u00a0: services de cybers\u00e9curit\u00e9 | Sonatus\",\"isPartOf\":{\"@id\":\"https:\/\/www.sonatus.com\/fr\/#website\"},\"datePublished\":\"2023-05-16T19:17:33+00:00\",\"dateModified\":\"2024-11-25T05:37:18+00:00\",\"description\":\"D\u00e9tectez et pr\u00e9venez les menaces sur les r\u00e9seaux embarqu\u00e9s et h\u00e9bergez des ECU (Electronic Control Units, unit\u00e9s de contr\u00f4le \u00e9lectronique) avec des politiques de surveillance hautement configurables \u00e0 l\u2019aide des services de s\u00e9curit\u00e9 de Sonatus\u00a0Foundation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sonatus.com\/fr\/sonatus-foundation\/services-de-securite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sonatus.com\/fr\/sonatus-foundation\/services-de-securite\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sonatus.com\/fr\/sonatus-foundation\/services-de-securite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sonatus.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sonatus Foundation\",\"item\":\"https:\/\/www.sonatus.com\/fr\/sonatus-foundation\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Services de s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sonatus.com\/fr\/#website\",\"url\":\"https:\/\/www.sonatus.com\/fr\/\",\"name\":\"Sonatus\",\"description\":\"Accelerating Vehicle Software Innovation\",\"publisher\":{\"@id\":\"https:\/\/www.sonatus.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sonatus.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sonatus.com\/fr\/#organization\",\"name\":\"Sonatus\",\"url\":\"https:\/\/www.sonatus.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.sonatus.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/sonatus-logo.svg\",\"contentUrl\":\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/sonatus-logo.svg\",\"width\":202,\"height\":32,\"caption\":\"Sonatus\"},\"image\":{\"@id\":\"https:\/\/www.sonatus.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/sonatus\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Sonatus\u00a0Foundation\u00a0: services de cybers\u00e9curit\u00e9 | Sonatus","description":"D\u00e9tectez et pr\u00e9venez les menaces sur les r\u00e9seaux embarqu\u00e9s et h\u00e9bergez des ECU (Electronic Control Units, unit\u00e9s de contr\u00f4le \u00e9lectronique) avec des politiques de surveillance hautement configurables \u00e0 l\u2019aide des services de s\u00e9curit\u00e9 de Sonatus\u00a0Foundation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sonatus.com\/fr\/sonatus-foundation\/services-de-securite\/","og_locale":"fr_FR","og_type":"article","og_title":"Services de s\u00e9curit\u00e9","og_description":"D\u00e9tectez et pr\u00e9venez les menaces sur les r\u00e9seaux embarqu\u00e9s et h\u00e9bergez des ECU (Electronic Control Units, unit\u00e9s de contr\u00f4le \u00e9lectronique) avec des politiques de surveillance hautement configurables \u00e0 l\u2019aide des services de s\u00e9curit\u00e9 de Sonatus\u00a0Foundation.","og_url":"https:\/\/www.sonatus.com\/fr\/sonatus-foundation\/services-de-securite\/","og_site_name":"Sonatus","article_modified_time":"2024-11-25T05:37:18+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/Sonatus-BlogCard.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.sonatus.com\/fr\/sonatus-foundation\/services-de-securite\/","url":"https:\/\/www.sonatus.com\/fr\/sonatus-foundation\/services-de-securite\/","name":"Sonatus\u00a0Foundation\u00a0: services de cybers\u00e9curit\u00e9 | Sonatus","isPartOf":{"@id":"https:\/\/www.sonatus.com\/fr\/#website"},"datePublished":"2023-05-16T19:17:33+00:00","dateModified":"2024-11-25T05:37:18+00:00","description":"D\u00e9tectez et pr\u00e9venez les menaces sur les r\u00e9seaux embarqu\u00e9s et h\u00e9bergez des ECU (Electronic Control Units, unit\u00e9s de contr\u00f4le \u00e9lectronique) avec des politiques de surveillance hautement configurables \u00e0 l\u2019aide des services de s\u00e9curit\u00e9 de Sonatus\u00a0Foundation.","breadcrumb":{"@id":"https:\/\/www.sonatus.com\/fr\/sonatus-foundation\/services-de-securite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sonatus.com\/fr\/sonatus-foundation\/services-de-securite\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.sonatus.com\/fr\/sonatus-foundation\/services-de-securite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sonatus.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Sonatus Foundation","item":"https:\/\/www.sonatus.com\/fr\/sonatus-foundation\/"},{"@type":"ListItem","position":3,"name":"Services de s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.sonatus.com\/fr\/#website","url":"https:\/\/www.sonatus.com\/fr\/","name":"Sonatus","description":"Accelerating Vehicle Software Innovation","publisher":{"@id":"https:\/\/www.sonatus.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sonatus.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.sonatus.com\/fr\/#organization","name":"Sonatus","url":"https:\/\/www.sonatus.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.sonatus.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/sonatus-logo.svg","contentUrl":"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/sonatus-logo.svg","width":202,"height":32,"caption":"Sonatus"},"image":{"@id":"https:\/\/www.sonatus.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/sonatus\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.sonatus.com\/fr\/wp-json\/wp\/v2\/pages\/17798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sonatus.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sonatus.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sonatus.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sonatus.com\/fr\/wp-json\/wp\/v2\/comments?post=17798"}],"version-history":[{"count":2,"href":"https:\/\/www.sonatus.com\/fr\/wp-json\/wp\/v2\/pages\/17798\/revisions"}],"predecessor-version":[{"id":19398,"href":"https:\/\/www.sonatus.com\/fr\/wp-json\/wp\/v2\/pages\/17798\/revisions\/19398"}],"up":[{"embeddable":true,"href":"https:\/\/www.sonatus.com\/fr\/wp-json\/wp\/v2\/pages\/17740"}],"wp:attachment":[{"href":"https:\/\/www.sonatus.com\/fr\/wp-json\/wp\/v2\/media?parent=17798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}