{"id":4432,"date":"2022-10-12T11:06:59","date_gmt":"2022-10-12T09:06:59","guid":{"rendered":"https:\/\/rcfo-cegedim-cloud.cegedim.com\/services-catalogue\/security\/"},"modified":"2025-03-05T15:09:58","modified_gmt":"2025-03-05T14:09:58","slug":"security","status":"publish","type":"page","link":"https:\/\/cegedim.cloud\/en\/products\/security\/","title":{"rendered":"Security"},"content":{"rendered":"
[et_pb_section fb_built=”1″ _builder_version=”4.18.0″ _module_preset=”default” collapsed=”on” global_colors_info=”{}”][et_pb_row _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Security” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h1″ global_colors_info=”{}”]<\/p>\n
cegedim<\/span>.<\/span>cloud<\/span><\/strong> offers many solutions to ensure the security of your data and your employees.<\/p>\n [\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ specialty=”on” _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_menu menu_id=”36″ _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_menu][\/et_pb_column][et_pb_column type=”3_4″ specialty_columns=”3″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_row_inner admin_label=”Data Masking – 01″ module_id=”data-masking” _builder_version=”4.20.4″ _module_preset=”default” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”2_3″ _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Data Masking” admin_label=”R\u00e9sum\u00e9” _builder_version=”4.27.4″ _module_preset=”default” header_level=”h2″ hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″]<\/p>\n Data Masking enables effective desensitization of a data set using comprehensive and flexible masking rules<\/strong>, making it available in different types of environments (analysis, testing, development, etc.):<\/p>\n Define masking rules according to your business needs:<\/p>\n Various use cases:<\/p>\n [\/et_pb_blurb][et_pb_button button_url=”https:\/\/academy.cegedim.cloud\/v\/francais\/securite\/data-masking” url_new_window=”on” button_text=”Lean more” _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_button][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner admin_label=”Campagne de phishing – 01″ module_id=”phishing” _builder_version=”4.21.0″ _module_preset=”default” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”2_3″ _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Phishing campaign” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h2″ global_colors_info=”{}”]<\/p>\n Phishing campaigns are used to evaluate the effectiveness of email security awareness. This new service allows you to test the vigilance of your employees:<\/p>\n [\/et_pb_blurb][et_pb_image src=”https:\/\/cegedim.cloud\/wp-content\/uploads\/2023\/04\/security-campaign-phishing-timeline.jpg” title_text=”security-campaign-phishing-timeline” show_in_lightbox=”on” _builder_version=”4.27.4″ _module_preset=”default” hover_enabled=”0″ global_colors_info=”{}” alt=”Security campaign phishing timeline” sticky_enabled=”0″][\/et_pb_image][et_pb_button button_url=”https:\/\/academy.cegedim.cloud\/v\/francais\/securite\/campagne-de-phishing” url_new_window=”on” button_text=”Lean more” _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_button][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner admin_label=”Advanced Vulnerability Assessment – 01″ module_id=”ava” _builder_version=”4.20.4″ _module_preset=”default” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”2_3″ _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Advanced Vulnerability Assessment ” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h2″ global_colors_info=”{}”]<\/p>\n Advanced Vulnerability Assessment (AVA) allows you to combine a system vulnerability audit with an application vulnerability audit for a 360\u00b0 view of your security level. The AVA service integrates a set of security tests on selected targets to provide a complete and comprehensive audit report. For each identified vulnerability, the report provides the criticality, description, attack vector, potential impact and solution.<\/p>\n AVA relies on two market-leading and complementary vulnerability audit solutions:<\/p>\n Identify and fix your security vulnerabilities before others exploit them!<\/p>\n [\/et_pb_blurb][et_pb_button button_url=”https:\/\/academy.cegedim.cloud\/v\/francais\/securite\/eav-evaluation-avancee-des-vulnerabilites” url_new_window=”on” button_text=”Lean more” _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_button][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner admin_label=”Bot Defense – 01″ module_id=”bot-defense” _builder_version=”4.20.4″ _module_preset=”default” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”2_3″ _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Bot Defense” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h2″ global_colors_info=”{}”]<\/p>\n Bot Defense protects your Internet applications from automated attacks by identifying and mitigating malicious bots.<\/p>\n Bots are automated software designed to perform relatively simple and repetitive tasks on the Internet. One of its main characteristics is that the bot can perform this task at a much higher speed than a human being, 24\/7.<\/p>\n Bot Defense relies on two security mechanisms:<\/p>\n Depending on the type of threat detected (suspicious\/malicious bots), slight or excessive increase in traffic, appropriate responses are automatically provided:<\/p>\n The Bot Defense solution from cegedim<\/span>.<\/span>cloud<\/span><\/strong> offers the following main features :<\/p>\n Transparency: access to 3 months of logs generated by Bot Defense<\/p>\n [\/et_pb_blurb][et_pb_button button_url=”https:\/\/academy.cegedim.cloud\/v\/francais\/securite\/bot-defense” url_new_window=”on” button_text=”Lean more” _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_button][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner admin_label=”Vault Secret Management – 01″ module_id=”vault” _builder_version=”4.20.4″ _module_preset=”default” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”2_3″ _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Vault Secret Management” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h2″ global_colors_info=”{}”]Vault is a solution for securely managing secrets<\/strong> such as passwords, tokens, passphrases, private keys, etc. Applications and services will turn to Vault Secret Management to consume the secrets they need while eliminating their presence in configuration files, scripts and other source code.<\/p>\n Vault Secret Management provides strong secret encryption, authentication management, authorization management and high availability.<\/p>\n [\/et_pb_blurb][et_pb_button button_url=”https:\/\/academy.cegedim.cloud\/v\/francais\/securite\/vault” url_new_window=”on” button_text=”Lean more” _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_button][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner admin_label=”Contact” _builder_version=”4.20.2″ _module_preset=”default” saved_tabs=”all” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Need more information about cegedim.cloud?” _builder_version=”4.21.0″ _module_preset=”default” header_level=”h2″ global_colors_info=”{}”]<\/p>\n If you would like to find out more about cegedim.cloud’s offerings<\/strong>, please contact us and an expert will get back to you as soon as possible.<\/p>\nData Masking is a solution that creates secure copies of databases<\/strong> by desensitizing personal data. Datamasking as a Service<\/strong> allows to meet the challenges of protection, consistency and confidentiality of data by depersonalizing the values, and maintaining structural rules allowing to manipulate data.<\/p>\n
\n
\n
\n
\n
\n
\u2013 Vulnerability scanning of public and private IP addresses of all components of your application<\/li>\n
\u2013 Dynamic Application Security Testing (DAST) solution
\u2013 Unauthenticated scan: testing the resistance of authentication forms, enrolment forms, password resets, etc.
\u2013 Authenticated scan: exploitation of internal application functions, data partitioning, elevation of privileges, etc.
\u2013 API Scan: Supported API types: SOAP\/XML, REST, GraphQL<\/li>\n<\/ul>\n\n
\n
\n
\n
\n
\n