{"version":"1.0","provider_name":"EENewsEurope","provider_url":"https:\/\/www.ecinews.fr\/fr\/","author_name":"eeNews Europe","author_url":"https:\/\/www.ecinews.fr\/fr\/author\/eenews-europe\/","title":"Cybers\u00e9curit\u00e9 : d\u00e9tecter les intrus d\u00e9j\u00e0 dans le r\u00e9seau !","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"CfOHxnvPtH\"><a href=\"https:\/\/www.ecinews.fr\/fr\/cybersecurite-detecter-les-intrus-deja-dans-le-reseau\/\">Cybers\u00e9curit\u00e9 : d\u00e9tecter les intrus d\u00e9j\u00e0 dans le r\u00e9seau !<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ecinews.fr\/fr\/cybersecurite-detecter-les-intrus-deja-dans-le-reseau\/embed\/#?secret=CfOHxnvPtH\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Cybers\u00e9curit\u00e9 : d\u00e9tecter les intrus d\u00e9j\u00e0 dans le r\u00e9seau !\u00a0\u00bb &#8212; EENewsEurope\" data-secret=\"CfOHxnvPtH\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/import\/eci7516_sas-cybersecutity_r.jpg","thumbnail_width":960,"thumbnail_height":668,"description":"R\u00e9compens\u00e9 par le Prix 2015 de l'Innovation technologique d\u00e9cern\u00e9 par Ventana Research, le logiciel SAS Cybersecurity de SAS est le syst\u00e8me de d\u00e9fense indispensable pour lutter contre les cybercriminels. Il d\u00e9tecte la menace la plus critique que repr\u00e9sentent les intrus d\u00e9j\u00e0 pr\u00e9sents dans le r\u00e9seau, en passant des milliards d'\u00e9v\u00e9nements quotidiens au peigne fin, \u00e0 la recherche d'anomalies."}