{"id":22,"date":"2023-10-31T15:32:49","date_gmt":"2023-10-31T14:32:49","guid":{"rendered":"http:\/\/exiteam.fr\/?page_id=22"},"modified":"2026-01-05T15:34:44","modified_gmt":"2026-01-05T14:34:44","slug":"netwitness-xdr","status":"publish","type":"page","link":"https:\/\/exiteam.fr\/index.php\/netwitness-xdr\/","title":{"rendered":"Netwitness XDR"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>NetWitness propose une solution XDR compl\u00e8te qui acc\u00e9l\u00e8re la d\u00e9tection, l\u2019investigation et la r\u00e9ponse aux incidents de fa\u00e7on unifi\u00e9e. <\/p>\n\n\n\n<p>NetWitness XDR collecte et analyse les donn\u00e9es provenant de diff\u00e9rentes sources : \u2013 Logs (SIEM) \u2013 Network (NDR) \u2013 Endpoint (EDR) \u2013 Analyse comportemental (UEBA) \u2013 Threat Intelligence Platform (TIP) \u2013 Orchestration (SOAR) Et une int\u00e9gration multi-plateformes (physique, virtuel &amp; cloud)<\/p>\n\n\n\n<p>plus d&rsquo;informations : <a href=\"http:\/\/www.netwitness.com\">http:\/\/www.netwitness.com<\/a><\/p>\n\n\n\n<p>Pr\u00e9sent depuis 20 ans sur le march\u00e9 du SIEM, la solution Netwitness a remplac\u00e9 la solution enVision en 2012. <\/p>\n\n\n\n<p>Exiteam assure les prestations suivantes sur cette solution :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Int\u00e9gration<\/li>\n\n\n\n<li>Configuration des collectes et des restitutions <\/li>\n\n\n\n<li>d\u00e9veloppement de parsers sp\u00e9cifiques (*)<\/li>\n\n\n\n<li>transfert de comp\u00e9tences adapt\u00e9s aux besoins clients<\/li>\n\n\n\n<li>support et assistance<\/li>\n<\/ul>\n\n\n\n<p>(*) parsers = filtre d&rsquo;analyse sp\u00e9cifique au format des logs re\u00e7us quand ces logs ne sont pas standards ou ne sont pas interpret\u00e9es nativement par la solution Netwitness<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NetWitness propose une solution XDR compl\u00e8te qui acc\u00e9l\u00e8re la d\u00e9tection, l\u2019investigation et la r\u00e9ponse aux incidents de fa\u00e7on unifi\u00e9e. NetWitness XDR collecte et analyse les donn\u00e9es provenant de diff\u00e9rentes sources : \u2013 Logs (SIEM) \u2013 Network (NDR) \u2013 Endpoint (EDR) \u2013 Analyse comportemental (UEBA) \u2013 Threat Intelligence Platform (TIP) \u2013 Orchestration (SOAR) Et une int\u00e9gration [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":26,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-22","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/pages\/22","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/comments?post=22"}],"version-history":[{"count":13,"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/pages\/22\/revisions"}],"predecessor-version":[{"id":180,"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/pages\/22\/revisions\/180"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/media\/26"}],"wp:attachment":[{"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/media?parent=22"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}