{"version":"1.0","provider_name":"Cohesity","provider_url":"https:\/\/www.cohesity.com\/fr\/","author_name":"Sara Hunter","author_url":"https:\/\/www.cohesity.com\/fr\/blogs\/author\/sara-hunter\/","title":"Prot\u00e9gez vous contre les ransomwares avec Cohesity DataHawk","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"q4AOjLHXNv\"><a href=\"https:\/\/www.cohesity.com\/fr\/products\/datahawk\/\">DataHawk<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cohesity.com\/fr\/products\/datahawk\/embed\/#?secret=q4AOjLHXNv\" width=\"600\" height=\"338\" title=\"&#8220;DataHawk&#8221; &#8212; Cohesity\" data-secret=\"q4AOjLHXNv\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.cohesity.com\/wp-content\/new_media\/2023\/07\/datahawk-og.png","thumbnail_width":1,"thumbnail_height":1,"description":"Centralisez la commande et le contr\u00f4le des capacit\u00e9s de protection, de d\u00e9tection et de r\u00e9ponse, et utilisez la veille et l'analyse des menaces, l\u2019isolation des donn\u00e9es, et la classification des donn\u00e9es aliment\u00e9e par le ML pour vous prot\u00e9ger contre les ransomwares."}