{"id":9450,"date":"2019-08-02T00:00:00","date_gmt":"2019-08-02T00:00:00","guid":{"rendered":"https:\/\/dev-cohesity-new.pantheonsite.io\/press\/cohesity-expands-security-capabilities-by-empowering-enterprises-for-the-first-time-to-uncover-vulnerabilities-and-cyber-exposures-using-backup-data\/"},"modified":"2025-02-27T23:56:12","modified_gmt":"2025-02-28T07:56:12","slug":"cohesity-expands-security-capabilities-by-empowering-enterprises-for-the-first-time-to-uncover-vulnerabilities-and-cyber-exposures-using-backup-data","status":"publish","type":"press_release","link":"https:\/\/www.cohesity.com\/fr\/press\/cohesity-expands-security-capabilities-by-empowering-enterprises-for-the-first-time-to-uncover-vulnerabilities-and-cyber-exposures-using-backup-data\/","title":{"rendered":"Cohesity CyberScan d\u00e9tecte les vuln\u00e9rabilit\u00e9s d\u2019une infrastructure \u00e0 partir des donn\u00e9es de sauvegarde"},"content":{"rendered":"<ul>\n<li><em>Cohesity CyberScan permet de d\u00e9tecter les vuln\u00e9rabilit\u00e9s de l\u2019infrastructure IT en analysant les donn\u00e9es secondaires<\/em><\/li>\n<li><em>Cohesity CyberScan utilise <a href=\"https:\/\/www.tenable.com\/products\/tenable-io\" target=\"_blank\" rel=\"noopener noreferrer\">io<\/a> pour rep\u00e9rer les failles inscrites dans la base de donn\u00e9es publique <a href=\"https:\/\/cve.mitre.org\/\">Common Vulnerabilities and Exposures<\/a> (<a href=\"https:\/\/cve.mitre.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">CVE<\/a>)<\/em><\/li>\n<li><em>Cohesity CyberScan associ\u00e9 \u00e0 Tenable.io, vient compl\u00e9ter la solution anti-ransomware de Cohesity administr\u00e9e via le m\u00eame tableau de bord de s\u00e9curit\u00e9<\/em><\/li>\n<li><em>L\u2019application est disponible sur Cohesity MarketPlace au c\u00f4t\u00e9 d\u2019autres applications de renforcement de la s\u00e9curit\u00e9<\/em><\/li>\n<\/ul>\n<p><strong>Paris, France. \u2013 2 ao\u00fbt 2019 \u2013<\/strong> <a href=\"https:\/\/www.cohesity.com\/fr\/\">Cohesity<\/a> renforce son offre de s\u00e9curit\u00e9 avec une nouvelle application, Cohesity CyberScan, qui s\u2019appuie sur les donn\u00e9es de sauvegarde -ou donn\u00e9es secondaires- pour d\u00e9couvrir les vuln\u00e9rabilit\u00e9s et \u00e9valuer le niveau de risque de l\u2019environnement IT d\u2019une entreprise. Ces vuln\u00e9rabilit\u00e9s sont souvent utilis\u00e9es lors de cyberattaques ou de compromission de donn\u00e9es, notamment par des ransomware. Il est fondamental de les d\u00e9couvrir pour se d\u00e9fendre contre les criminels.<\/p>\n<p>Identifier et combler les vuln\u00e9rabilit\u00e9s devient une priorit\u00e9 pour les entreprises. D\u2019apr\u00e8s une <a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/unpatched-vulnerabilities-the-source-of-most-data-breaches\/d\/d-id\/1331465\" target=\"_blank\" rel=\"noopener noreferrer\">r\u00e9cente \u00e9tude<\/a>, la majorit\u00e9 d\u2019entreprises qui auraient subi une compromission de donn\u00e9es au cours des deux derni\u00e8res ann\u00e9es d\u00e9clarent qu\u2019une vuln\u00e9rabilit\u00e9 connue mais non corrig\u00e9e en \u00e9tait \u00e0 l\u2019origine. Dans la m\u00eame \u00e9tude, 37% des entreprises reconnaissent ne pas rechercher les vuln\u00e9rabilit\u00e9s.<\/p>\n<p>Cohesity CyberScan facilite justement la recherche de vuln\u00e9rabilit\u00e9s. Disponible sur le <a href=\"https:\/\/marketplace.cohesity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cohesity MarketPlace<\/a>, elle analyse les copies de sauvegarde g\u00e9r\u00e9es par <a href=\"https:\/\/www.cohesity.com\/fr\/products\/data-platform\/\">Cohesity DataPlatform<\/a> (et non la copie de production live) pour identifier les vuln\u00e9rabilit\u00e9s \u00e0 l\u2019\u00e9chelle de l\u2019environnement IT d\u2019une entreprise, syst\u00e8mes d\u2019exploitations, ordinateurs, \u00e9quipements r\u00e9seau et configurations compris. L\u2019application donne une vue globale des vuln\u00e9rabilit\u00e9s via un tableau de bord de s\u00e9curit\u00e9 intuitif o\u00f9 apparaissent des recommandations sur la fa\u00e7on de r\u00e9gler les failles avant que des hackers n\u2019en profitent.<\/p>\n<p>Cohesity CyberScan utilise <a href=\"https:\/\/www.tenable.com\/products\/tenable-io\" target=\"_blank\" rel=\"noopener noreferrer\">Tenable.io<\/a> pour rep\u00e9rer les failles inscrites dans la base de donn\u00e9es publique <a href=\"https:\/\/cve.mitre.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Common Vulnerabilities and Exposures<\/a> (<a href=\"https:\/\/cve.mitre.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">CVE<\/a>). L\u2019architecture unique de Cohesity DataPlatform permet <a href=\"https:\/\/www.cohesity.com\/press\/cohesity-unveils-industry-first-technology-unlocks-opportunities-extract-maximum-insights-visibility-efficiencies-applications-running-backup-unstructured-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">d&#8217;ex\u00e9cuter les applications<\/a> sur le cluster Cohesity directement, l\u00e0 o\u00f9 r\u00e9sident les donn\u00e9es, plut\u00f4t que de devoir d\u00e9placer les donn\u00e9es dans un environnement applicatif distinct.<\/p>\n<p>\u00ab\u00a0C\u2019est la premi\u00e8re fois qu\u2019une application permet de d\u00e9tecter les vuln\u00e9rabilit\u00e9s \u00e0 partir de donn\u00e9es de sauvegarde\u00a0\u00bb, d\u00e9clare Ray Komar, vice-pr\u00e9sident en charge des partenariats technologiques chez Tenable. \u00ab\u00a0Nous sommes convaincus que cette approche innovante permettra aux entreprises de renforcer et d\u2019am\u00e9liorer leur posture de s\u00e9curit\u00e9 sur l\u2019ensemble de leurs environnements IT.\u00a0\u00bb<\/p>\n<p>\u00ab\u00a0L\u2019application Cohesity CyberScan est pour nous un moyen bien plus efficace de d\u00e9couvrir des vuln\u00e9rabilit\u00e9s par l\u2019analyse des donn\u00e9es de sauvegarde au sein de Cohesity plut\u00f4t que de devoir mobiliser notre environnement de production\u00a0\u00bb, d\u00e9clare Mike O&#8217;Rourke, DSI de Lighthouse Resources Inc. \u00ab\u00a0Notre capacit\u00e9 de reprise apr\u00e8s sinistre s\u2019en trouve renforc\u00e9e \u00e9galement puisque nous pouvons d\u00e9terminer facilement quelles sauvegardes sont possiblement compromises et celles que nous pouvons utiliser pour une reprise instantan\u00e9e.\u00a0\u00bb<\/p>\n<p>De plus, Cohesity CyberScan aide les professionnels IT \u00e0 v\u00e9rifier les sauvegardes, et le potentiel de r\u00e9cup\u00e9ration d\u2019un instantan\u00e9. Ceci permet d\u2019\u00e9viter de r\u00e9injecter des vuln\u00e9rabilit\u00e9s connues ou d\u00e9j\u00e0 trait\u00e9es dans l\u2019environnement de production lors d\u2019une restauration.<\/p>\n<p>L\u2019application permet \u00e9galement aux entreprises d\u2019effectuer fr\u00e9quemment des scans des donn\u00e9es de sauvegarde, plut\u00f4t que de devoir attendre des semaines ou des mois pour programmer des scans dans l\u2019environnement de production, ce qui limite davantage encore le risque de compromission de donn\u00e9es. Ce processus n\u2019a aucun impact sur la performance de production et ne n\u00e9cessite pas de programme les scans lors d\u2019une fen\u00eatre de maintenance.<\/p>\n<p>\u00ab\u00a0Les entreprises ont besoin d\u2019un environnement IT qui tourne 24h\/24 et 7j\/7 et souhaitent \u00e9viter de restaurer des VM avec des vuln\u00e9rabilit\u00e9s connues\u00a0\u00bb, d\u00e9clare Raj Rajamani, vice-pr\u00e9sident en charge du portefeuille produit chez Cohesity. \u00ab\u00a0Non seulement, nous aidons nos clients \u00e0 mieux valoriser leurs donn\u00e9es de sauvegarde, mais nous sommes fiers de leur proposer la premi\u00e8re solution du march\u00e9 qui leur permet d\u2019identifier les vuln\u00e9rabilit\u00e9s et erreurs de configuration sans ralentir leurs activit\u00e9s strat\u00e9giques.\u00a0\u00bb<\/p>\n<p>\u00ab\u00a0On mesure l\u2019IT en termes de SLA. Avec cette nouvelle fonctionnalit\u00e9, Cohesity aide les entreprises \u00e0 d\u00e9passer les obstacles et tenir leurs objectifs de s\u00e9curit\u00e9 et de restauration\u00a0\u00bb, d\u00e9clare Phil Goodwin, directeur de recherche, sp\u00e9cialiste de la gestion des donn\u00e9es dans le cloud aux fins de protection, IDC. \u00ab\u00a0L\u2019application Cohesity CyberScan utilise les copies de sauvegarde pour plus de visibilit\u00e9 sur les syst\u00e8mes de production, elle v\u00e9rifie les sauvegardes aux fins de restauration et aide l\u2019IT \u00e0 ne pas r\u00e9injecter des vuln\u00e9rabilit\u00e9s en restaurant un instantan\u00e9 de sauvegarde, le tout sans aucun impact sur les donn\u00e9es ni l\u2019environnement de production.\u00a0\u00bb<\/p>\n<p><strong>Se prot\u00e9ger sur plusieurs fronts gr\u00e2ce aux donn\u00e9es de sauvegarde<\/strong><\/p>\n<p>Cette derni\u00e8re version s\u2019appuie sur les fonctionnalit\u00e9s de s\u00e9curit\u00e9 de Cohesity pour assurer la protection sur plusieurs fronts\u00a0: scans \u00e0 la recherche de vuln\u00e9rabilit\u00e9s, solution compl\u00e8te anti-ransomware et applications antivirus.<\/p>\n<ul>\n<li><strong>Ligne de d\u00e9fense contre les ransomwares\u00a0:<\/strong> Cohesity permet aux entreprises d\u2019emp\u00eacher que leurs donn\u00e9es de sauvegarde deviennent des cibles et de d\u00e9tecter les <a href=\"https:\/\/www.cohesity.com\/press\/cohesity-delivers-first-modern-backup-solution-prevents-detects-responds-ransomware-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">attaques de ransomware<\/a> et y r\u00e9pondre gr\u00e2ce \u00e0 son syst\u00e8me de fichiers immuable, sa capacit\u00e9 \u00e0 d\u00e9tecter les anomalies et ses restaurations massives instantan\u00e9es. Les clients ont acc\u00e8s aux fonctionnalit\u00e9s anti-ransomware de Cohesity depuis le m\u00eame tableau de bord de s\u00e9curit\u00e9 o\u00f9 r\u00e9side le scan des vuln\u00e9rabilit\u00e9s, ce qui conf\u00e8re aux clients plus de visibilit\u00e9 et de renseignements sur les angles morts dans leur environnement IT.<\/li>\n<li><strong>Applications antivirus sans infrastructure parall\u00e8le\u00a0:<\/strong> les clients de Cohesity peuvent d\u00e9fendre leur infrastructure de fichiers contre les attaques en ex\u00e9cutant l\u2019application open source <a href=\"https:\/\/marketplace.cohesity.com\/app-details\/7\" target=\"_blank\" rel=\"noopener noreferrer\">ClamA<\/a><a href=\"https:\/\/marketplace.cohesity.com\/app-details\/7\" target=\"_blank\" rel=\"noopener noreferrer\">V<\/a> directement sur les donn\u00e9es stock\u00e9es sur <a href=\"https:\/\/www.cohesity.com\/products\/data-platform\/\">Cohesity DataPlatform<\/a>, au lieu de devoir copier les donn\u00e9es sur une infrastructure parall\u00e8le pour les analyser. <a href=\"https:\/\/marketplace.cohesity.com\/app-details\/8\" target=\"_blank\" rel=\"noopener noreferrer\">SentinelOne<\/a>, \u00e9galement disponible sur <a href=\"https:\/\/marketplace.cohesity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cohesity MarketPlace<\/a>, propose des biblioth\u00e8ques \u00e0 jour de virus sur la base d\u2019algorithmes de machine-learning directement sur Cohesity DataPlatform.<\/li>\n<\/ul>\n<p>L\u2019application Cohesity CyberScan est rendue disponible \u00e0 tous les clients avec Pegasus 6.4.<\/p>\n<p>Pour en savoir plus\u00a0:<\/p>\n<ul>\n<li>En savoir plus sur l\u2019<a href=\"https:\/\/marketplace.cohesity.com\/app-details\/11\" target=\"_blank\" rel=\"noopener noreferrer\">application Cohesity CyberScan <\/a>sur le site web Cohesity<\/li>\n<li>Visionner une <a href=\"https:\/\/www.youtube.com\/watch?v=VLjauRFm5Sw\" target=\"_blank\" rel=\"noopener noreferrer\">vid\u00e9o de d\u00e9monstration<\/a> de l\u2019application Cohesity CyberScan<\/li>\n<li>Lire le <a href=\"https:\/\/www.cohesity.com\/fr\/solutions\/ransomware\/predictable-recovery\/\" target=\"_blank\" rel=\"noopener noreferrer\">document de solution<\/a> pour Cohesity Cyberscan<\/li>\n<\/ul>\n<p><strong>A propos de Cohesity<\/strong><br \/>\n<a href=\"https:\/\/www.cohesity.com\/fr\/\">Cohesity<\/a> r\u00e9volutionne la gestion des donn\u00e9es en apportant une solution \u00e0 un d\u00e9fi majeur pour les entreprises aujourd\u2019hui\u00a0: la fragmentation massive des donn\u00e9es. La majorit\u00e9 des donn\u00e9es d\u2019entreprise \u2013 sauvegardes, archives, partage de fichiers, stockage d\u2019objets et donn\u00e9es utilis\u00e9es pour le test\/dev et les analyses \u2013 se trouvent dans des silos d\u2019infrastructures fragment\u00e9s ce qui les rend complexes \u00e0 prot\u00e9ger, co\u00fbteuses \u00e0 g\u00e9rer et difficiles \u00e0 analyser. Cohesity consolide les silos sur une <a href=\"https:\/\/www.cohesity.com\/fr\/products\/data-platform\/\">plate-forme<\/a> Web unique, englobant des applications sur site, dans le cloud et en p\u00e9riph\u00e9rie, et permet aux entreprises d\u2019ex\u00e9cuter des applications sur cette plateforme, ce qui facilite la sauvegarde des donn\u00e9es et l\u2019extraction des informations. Cohesity est <a href=\"https:\/\/www.cohesity.com\/press\/cohesity-named-to-the-2019-cnbc-disruptor-50\/\" target=\"_blank\" rel=\"noopener noreferrer\">2019 CNBC Disruptor<\/a> et a \u00e9t\u00e9 nomm\u00e9 <a href=\"https:\/\/www.cohesity.com\/press\/cohesity-awarded-technology-pioneer-world-economic-forum\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u00a0<\/a><a href=\"https:\/\/www.cohesity.com\/press\/cohesity-awarded-technology-pioneer-world-economic-forum\/\" target=\"_blank\" rel=\"noopener noreferrer\">Technology Pioneer by the World Economic Forum<\/a>. Informations suppl\u00e9mentaires sur le <a href=\"https:\/\/www.cohesity.com\/fr\/\">site internet<\/a> et <a href=\"https:\/\/cohesity.com\/blogs\/\" target=\"_blank\" rel=\"noopener noreferrer\">blog<\/a> de Cohesity ou en suivant Cohesity sur\u00a0<a href=\"https:\/\/twitter.com\/cohesity\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>,\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/3750699\/\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a> et\u00a0<a href=\"https:\/\/www.facebook.com\/cohesity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n<p><strong>Contact presse : <\/strong><br \/>\nAxiCom<br \/>\n<a href=\"mailto:cohesity.france@axicom.com\">cohesity.france@axicom.com<\/a><br \/>\n01 56 02 68 26<\/p>\n","protected":false},"featured_media":0,"template":"","class_list":["post-9450","press_release","type-press_release","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.2 (Yoast SEO v24.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cohesity CyberScan d\u00e9tecte les vuln\u00e9rabilit\u00e9s d\u2019une infrastructure \u00e0 partir des donn\u00e9es de sauvegarde | Cohesity<\/title>\n<meta name=\"description\" content=\"Cohesity CyberScan permet de d\u00e9tecter les vuln\u00e9rabilit\u00e9s de l\u2019infrastructure IT en analysant les donn\u00e9es secondaires Cohesity CyberScan utilise io pour\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cohesity.com\/fr\/press\/cohesity-expands-security-capabilities-by-empowering-enterprises-for-the-first-time-to-uncover-vulnerabilities-and-cyber-exposures-using-backup-data\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cohesity CyberScan d\u00e9tecte les vuln\u00e9rabilit\u00e9s d\u2019une infrastructure \u00e0 partir des donn\u00e9es de sauvegarde\" \/>\n<meta property=\"og:description\" content=\"Cohesity CyberScan permet de d\u00e9tecter les vuln\u00e9rabilit\u00e9s de l\u2019infrastructure IT en analysant les donn\u00e9es secondaires Cohesity CyberScan utilise io pour\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cohesity.com\/fr\/press\/cohesity-expands-security-capabilities-by-empowering-enterprises-for-the-first-time-to-uncover-vulnerabilities-and-cyber-exposures-using-backup-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Cohesity\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cohesity\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-28T07:56:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cohesity.com\/wp-content\/new_media\/2020\/10\/cohesity-logo-new.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@cohesity\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cohesity.com\/fr\/press\/cohesity-expands-security-capabilities-by-empowering-enterprises-for-the-first-time-to-uncover-vulnerabilities-and-cyber-exposures-using-backup-data\/\",\"url\":\"https:\/\/www.cohesity.com\/fr\/press\/cohesity-expands-security-capabilities-by-empowering-enterprises-for-the-first-time-to-uncover-vulnerabilities-and-cyber-exposures-using-backup-data\/\",\"name\":\"Cohesity CyberScan d\u00e9tecte les vuln\u00e9rabilit\u00e9s d\u2019une infrastructure \u00e0 partir des donn\u00e9es de sauvegarde | Cohesity\",\"isPartOf\":{\"@id\":\"https:\/\/www.cohesity.com\/fr\/#website\"},\"datePublished\":\"2019-08-02T00:00:00+00:00\",\"dateModified\":\"2025-02-28T07:56:12+00:00\",\"description\":\"Cohesity CyberScan permet de d\u00e9tecter les vuln\u00e9rabilit\u00e9s de l\u2019infrastructure IT en analysant les donn\u00e9es secondaires Cohesity CyberScan utilise io pour\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cohesity.com\/fr\/press\/cohesity-expands-security-capabilities-by-empowering-enterprises-for-the-first-time-to-uncover-vulnerabilities-and-cyber-exposures-using-backup-data\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cohesity.com\/fr\/press\/cohesity-expands-security-capabilities-by-empowering-enterprises-for-the-first-time-to-uncover-vulnerabilities-and-cyber-exposures-using-backup-data\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cohesity.com\/fr\/press\/cohesity-expands-security-capabilities-by-empowering-enterprises-for-the-first-time-to-uncover-vulnerabilities-and-cyber-exposures-using-backup-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cohesity.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cohesity CyberScan d\u00e9tecte les vuln\u00e9rabilit\u00e9s d\u2019une infrastructure \u00e0 partir des donn\u00e9es de sauvegarde\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cohesity.com\/fr\/#website\",\"url\":\"https:\/\/www.cohesity.com\/fr\/\",\"name\":\"Cohesity\",\"description\":\"Eliminate mass data fragmentation with Cohesity\u2019s modern approach to data management, beginning with backup. Gain instant recovery.\",\"publisher\":{\"@id\":\"https:\/\/www.cohesity.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cohesity.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cohesity.com\/fr\/#organization\",\"name\":\"Cohesity\",\"url\":\"https:\/\/www.cohesity.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cohesity.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cohesity.com\/wp-content\/new_media\/2020\/10\/cohesity_logo.svg\",\"contentUrl\":\"https:\/\/www.cohesity.com\/wp-content\/new_media\/2020\/10\/cohesity_logo.svg\",\"width\":143,\"height\":20,\"caption\":\"Cohesity\"},\"image\":{\"@id\":\"https:\/\/www.cohesity.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/cohesity\",\"https:\/\/x.com\/cohesity\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cohesity CyberScan d\u00e9tecte les vuln\u00e9rabilit\u00e9s d\u2019une infrastructure \u00e0 partir des donn\u00e9es de sauvegarde | Cohesity","description":"Cohesity CyberScan permet de d\u00e9tecter les vuln\u00e9rabilit\u00e9s de l\u2019infrastructure IT en analysant les donn\u00e9es secondaires Cohesity CyberScan utilise io pour","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cohesity.com\/fr\/press\/cohesity-expands-security-capabilities-by-empowering-enterprises-for-the-first-time-to-uncover-vulnerabilities-and-cyber-exposures-using-backup-data\/","og_locale":"fr_FR","og_type":"article","og_title":"Cohesity CyberScan d\u00e9tecte les vuln\u00e9rabilit\u00e9s d\u2019une infrastructure \u00e0 partir des donn\u00e9es de sauvegarde","og_description":"Cohesity CyberScan permet de d\u00e9tecter les vuln\u00e9rabilit\u00e9s de l\u2019infrastructure IT en analysant les donn\u00e9es secondaires Cohesity CyberScan utilise io pour","og_url":"https:\/\/www.cohesity.com\/fr\/press\/cohesity-expands-security-capabilities-by-empowering-enterprises-for-the-first-time-to-uncover-vulnerabilities-and-cyber-exposures-using-backup-data\/","og_site_name":"Cohesity","article_publisher":"https:\/\/www.facebook.com\/cohesity","article_modified_time":"2025-02-28T07:56:12+00:00","og_image":[{"width":800,"height":401,"url":"https:\/\/www.cohesity.com\/wp-content\/new_media\/2020\/10\/cohesity-logo-new.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@cohesity","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cohesity.com\/fr\/press\/cohesity-expands-security-capabilities-by-empowering-enterprises-for-the-first-time-to-uncover-vulnerabilities-and-cyber-exposures-using-backup-data\/","url":"https:\/\/www.cohesity.com\/fr\/press\/cohesity-expands-security-capabilities-by-empowering-enterprises-for-the-first-time-to-uncover-vulnerabilities-and-cyber-exposures-using-backup-data\/","name":"Cohesity CyberScan d\u00e9tecte les vuln\u00e9rabilit\u00e9s d\u2019une infrastructure \u00e0 partir des donn\u00e9es de sauvegarde | Cohesity","isPartOf":{"@id":"https:\/\/www.cohesity.com\/fr\/#website"},"datePublished":"2019-08-02T00:00:00+00:00","dateModified":"2025-02-28T07:56:12+00:00","description":"Cohesity CyberScan permet de d\u00e9tecter les vuln\u00e9rabilit\u00e9s de l\u2019infrastructure IT en analysant les donn\u00e9es secondaires Cohesity CyberScan utilise io pour","breadcrumb":{"@id":"https:\/\/www.cohesity.com\/fr\/press\/cohesity-expands-security-capabilities-by-empowering-enterprises-for-the-first-time-to-uncover-vulnerabilities-and-cyber-exposures-using-backup-data\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cohesity.com\/fr\/press\/cohesity-expands-security-capabilities-by-empowering-enterprises-for-the-first-time-to-uncover-vulnerabilities-and-cyber-exposures-using-backup-data\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cohesity.com\/fr\/press\/cohesity-expands-security-capabilities-by-empowering-enterprises-for-the-first-time-to-uncover-vulnerabilities-and-cyber-exposures-using-backup-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cohesity.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Cohesity CyberScan d\u00e9tecte les vuln\u00e9rabilit\u00e9s d\u2019une infrastructure \u00e0 partir des donn\u00e9es de sauvegarde"}]},{"@type":"WebSite","@id":"https:\/\/www.cohesity.com\/fr\/#website","url":"https:\/\/www.cohesity.com\/fr\/","name":"Cohesity","description":"Eliminate mass data fragmentation with Cohesity\u2019s modern approach to data management, beginning with backup. Gain instant recovery.","publisher":{"@id":"https:\/\/www.cohesity.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cohesity.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cohesity.com\/fr\/#organization","name":"Cohesity","url":"https:\/\/www.cohesity.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cohesity.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.cohesity.com\/wp-content\/new_media\/2020\/10\/cohesity_logo.svg","contentUrl":"https:\/\/www.cohesity.com\/wp-content\/new_media\/2020\/10\/cohesity_logo.svg","width":143,"height":20,"caption":"Cohesity"},"image":{"@id":"https:\/\/www.cohesity.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/cohesity","https:\/\/x.com\/cohesity"]}]}},"_links":{"self":[{"href":"https:\/\/www.cohesity.com\/fr\/wp-json\/wp\/v2\/press_release\/9450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cohesity.com\/fr\/wp-json\/wp\/v2\/press_release"}],"about":[{"href":"https:\/\/www.cohesity.com\/fr\/wp-json\/wp\/v2\/types\/press_release"}],"version-history":[{"count":1,"href":"https:\/\/www.cohesity.com\/fr\/wp-json\/wp\/v2\/press_release\/9450\/revisions"}],"predecessor-version":[{"id":275964,"href":"https:\/\/www.cohesity.com\/fr\/wp-json\/wp\/v2\/press_release\/9450\/revisions\/275964"}],"wp:attachment":[{"href":"https:\/\/www.cohesity.com\/fr\/wp-json\/wp\/v2\/media?parent=9450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}