{"id":4447,"date":"2022-10-12T11:06:59","date_gmt":"2022-10-12T09:06:59","guid":{"rendered":"https:\/\/rcfo-cegedim-cloud.cegedim.com\/services-catalogue\/network\/"},"modified":"2024-01-03T17:55:32","modified_gmt":"2024-01-03T16:55:32","slug":"network","status":"publish","type":"page","link":"https:\/\/cegedim.cloud\/en\/products\/network\/","title":{"rendered":"Network"},"content":{"rendered":"
[et_pb_section fb_built=”1″ _builder_version=”4.18.0″ _module_preset=”default” collapsed=”on” global_colors_info=”{}”][et_pb_row _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Network” _builder_version=”4.21.0″ _module_preset=”default” header_level=”h1″ global_colors_info=”{}”]<\/p>\n
Secure the traffic and internet exposure of your applications with our network interconnection and connectivity, traffic management and load balancing solutions.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ specialty=”on” _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_menu menu_id=”37″ _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_menu][\/et_pb_column][et_pb_column type=”3_4″ specialty_columns=”3″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_row_inner admin_label=”Interconnexions – 01″ module_id=”interconnections” _builder_version=”4.20.4″ _module_preset=”default” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”2_3″ _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Interconnections” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h2″ global_colors_info=”{}”]<\/p>\n
cegedim<\/span> .<\/span> cloud<\/span><\/strong> hosts more than 300 customer interconnections. We ensure the implementation of a secure and private interconnection between your environments and Cegedim network.<\/p>\n [\/et_pb_blurb][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner column_structure=”1_2,1_2″ admin_label=”Interconnexions – 02″ _builder_version=”4.20.4″ _module_preset=”default” custom_padding=”0px||||false|false” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner type=”1_2″ saved_specialty_column_type=”3_4″ _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/cegedim.cloud\/wp-content\/uploads\/2023\/12\/network-site-to-site-vpn_en.jpg” alt=”Network – Site-to-site VPN” title_text=”network-site-to-site-vpn” show_in_lightbox=”on” _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][et_pb_text _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n Physical link interconnection<\/strong><\/p>\n [\/et_pb_text][\/et_pb_column_inner][et_pb_column_inner type=”1_2″ saved_specialty_column_type=”3_4″ _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/cegedim.cloud\/wp-content\/uploads\/2023\/12\/network-physical-link-interconnection_en.jpg” alt=”Network – Physical link interconnection” title_text=”network-physical-link-interconnection” show_in_lightbox=”on” _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][et_pb_text _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n Site-to-site VPN<\/strong><\/p>\n [\/et_pb_text][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner admin_label=”Interconnexions – 03″ _builder_version=”4.20.4″ _module_preset=”default” custom_padding=”0px||||false|false” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”2_3″ _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n These different interconnection media can be combined and deployed as primary and\/or backup interconnection to ensure high availability of the links.<\/p>\n [\/et_pb_text][et_pb_blurb title=”Managed supports” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}”]End-to-end interconnection management: deployment of own hardware\/router, hosting of the solution, intervention of RUN teams, incident management.<\/p>\n [\/et_pb_blurb][et_pb_blurb title=”Non-managed supports” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}”]<\/p>\n cegedim<\/span> .<\/span> cloud<\/span><\/strong> does not intervene on your equipment \u2013 unless specifically requested by the customer. We guarantee the availability of our equipment.<\/p>\n [\/et_pb_blurb][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner admin_label=”VPN Ipsec utilisateur – 01″ module_id=”vpn-ipsec-user” _builder_version=”4.20.4″ _module_preset=”default” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”2_3″ _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”VPN for user” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h2″ global_colors_info=”{}”]<\/p>\n The VPN Ipsec user solution allows you a remote and secure access to your network. You can access all your resources from any remote location through a private, isolated and secure network.<\/p>\n User Ipsec VPN provides the following features:<\/p>\n [\/et_pb_blurb][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner admin_label=”Nom de domaine et certificats – 01″ module_id=”certificates” _builder_version=”4.20.4″ _module_preset=”default” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”2_3″ _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Domain name and certificates” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h2″ global_colors_info=”{}”]<\/p>\n Certificates allow you to secure your applications and sites exposed on the Internet by ensuring the encryption of data in transit between a user and a website. The certificate establishes a secure connection between the web server and the browser. Visitors then access your site through a secure connection indicated by a padlock icon and a URL beginning with the \u201chttps\u201d protocol.<\/p>\n cegedim<\/span> .<\/span> cloud<\/span><\/strong> deploys<\/strong> and manages SSL\/TLS (Secure Sockets Layer\/Transport Layer Security) certificates<\/strong> and offers several types of certificates:<\/p>\n cegedim<\/span> .<\/span> cloud<\/span><\/strong> provides a managed service<\/strong>, from domain name provisioning to SSL\/TLS certificate management:<\/p>\n [\/et_pb_blurb][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner admin_label=”Elastic Secured Endpoint – 01″ module_id=”elastic-secured-endpoint” _builder_version=”4.20.4″ _module_preset=”default” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”2_3″ _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Elastic Secured Endpoint” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h2″ global_colors_info=”{}”]<\/p>\n Exposed on the Internet, your applications are particularly exposed to the risks of cyber attacks: botnets, denial of service attacks (DDoS), intrusion, data leakage, etc. Through Elastic Secured Endpoint<\/strong>, cegedim<\/span>.<\/span>cloud<\/span><\/strong> provides a complete set of technologies for securely exposing your applications on the Internet.<\/p>\n Elastic Secured Endpoint<\/strong> is a fully managed<\/strong> service by our team of security experts. We ensure the deployment, management and reporting of the solution:<\/p>\n [\/et_pb_blurb][et_pb_blurb title=”Security and performance ” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}”]<\/p>\n Cegedim.cloud load balancers (F5 BIG-IP LTM) provides a deep understanding of the network application traffic<\/strong> and control<\/strong> over how it is managed. BIG-IP LTM is a full-featured reverse proxy which allows to inspect, manage and report on your network application traffic. From basic load balancing to complex traffic management decisions based on client, server, or application status, BIG-IP LTM gives you precise control over application traffic.<\/p>\n The SSL acceleration achieved by BIG-IP LTM offloads servers from HTTPS encryption and frees up resources to improve application performance.<\/p>\n Optimized compression and caching management improves interactive application performance, data loading times, and bandwidth utilization.<\/p>\n [\/et_pb_blurb][et_pb_text _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n Features<\/strong>:<\/p>\n [\/et_pb_text][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner column_structure=”1_3,1_3,1_3″ use_custom_gutter=”on” gutter_width=”2″ make_equal=”on” admin_label=”Elastic Secured Endpoint – 02″ _builder_version=”4.20.4″ _module_preset=”default” custom_padding=”0px||||false|false” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner type=”1_3″ saved_specialty_column_type=”3_4″ _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb image=”https:\/\/cegedim.cloud\/wp-content\/uploads\/2023\/05\/network.svg” admin_label=”Serveur” _builder_version=”4.21.0″ _module_preset=”default” header_level=”h3″ text_orientation=”center” animation=”off” global_colors_info=”{}”]<\/p>\n Intelligent traffic management decision based on applications and server constraints<\/p>\n [\/et_pb_blurb][\/et_pb_column_inner][et_pb_column_inner type=”1_3″ saved_specialty_column_type=”3_4″ _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb image=”https:\/\/cegedim.cloud\/wp-content\/uploads\/2023\/04\/layer-group.svg” admin_label=”Flexibilit\u00e9” _builder_version=”4.21.0″ _module_preset=”default” header_level=”h3″ text_orientation=”center” animation=”off” global_colors_info=”{}”]<\/p>\n Flexibility (scalability of resources on demand)<\/p>\n [\/et_pb_blurb][\/et_pb_column_inner][et_pb_column_inner type=”1_3″ saved_specialty_column_type=”3_4″ _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb image=”https:\/\/cegedim.cloud\/wp-content\/uploads\/2023\/04\/analyse.svg” admin_label=”Analyses” _builder_version=”4.21.0″ _module_preset=”default” header_level=”h3″ text_orientation=”center” animation=”off” global_colors_info=”{}”]<\/p>\n Real-time analyses (continuity, response time, traffic increase, etc.)<\/p>\n [\/et_pb_blurb][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner column_structure=”1_3,1_3,1_3″ use_custom_gutter=”on” gutter_width=”2″ make_equal=”on” admin_label=”Elastic Secured Endpoint – 03″ _builder_version=”4.20.4″ _module_preset=”default” custom_padding=”0px||||false|false” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner type=”1_3″ saved_specialty_column_type=”3_4″ _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb image=”https:\/\/cegedim.cloud\/wp-content\/uploads\/2023\/04\/traffic-encryption.svg” admin_label=”Chiffrement du trafic” _builder_version=”4.21.0″ _module_preset=”default” header_level=”h3″ text_orientation=”center” animation=”off” global_colors_info=”{}”]<\/p>\n Traffic encryption<\/p>\n [\/et_pb_blurb][\/et_pb_column_inner][et_pb_column_inner type=”1_3″ saved_specialty_column_type=”3_4″ _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb image=”https:\/\/cegedim.cloud\/wp-content\/uploads\/2023\/04\/optimized.svg” admin_label=”TCP\/IP optimis\u00e9” _builder_version=”4.21.0″ _module_preset=”default” header_level=”h3″ text_orientation=”center” animation=”off” global_colors_info=”{}”]<\/p>\n Optimized TCP\/IP<\/p>\n [\/et_pb_blurb][\/et_pb_column_inner][et_pb_column_inner type=”1_3″ saved_specialty_column_type=”3_4″ _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb image=”https:\/\/cegedim.cloud\/wp-content\/uploads\/2023\/04\/ssl-offloading.svg” admin_label=”D\u00e9chargement SSL” _builder_version=”4.21.0″ _module_preset=”default” header_level=”h3″ text_orientation=”center” animation=”off” global_colors_info=”{}”]<\/p>\n SSL offloading<\/p>\n [\/et_pb_blurb][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner admin_label=”Elastic Secured Endpoint – 04″ _builder_version=”4.20.4″ _module_preset=”default” custom_padding=”0px||||false|false” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”2_3″ _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Web Application Firewall (F5 BIG-IP ASM)” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}”]<\/p>\n BIG-IP Application Security Management (F5 BIG-IP ASM)<\/strong> enables organizations to be protected against the 10 greatest OWASP threats, application vulnerabilities and zero-day attacks. With the combination of Layer 7 DDoS defenses, advanced detection and mitigation techniques. As well as dynamic learning, virtual patch execution, and accurate attack visibility, BIG-IP repels even the most complex threats before they reach your servers.<\/p>\n [\/et_pb_blurb][et_pb_text _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n Benefits<\/strong>:<\/p>\n [\/et_pb_text][et_pb_pricing_tables show_bullet=”off” admin_label=”Blue Head Pricing” module_class=”blue-head-pricing” _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_pricing_table title=”The most effective ready-to-use security” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}” sticky_transition=”on”]<\/p>\n BIG-IP ASM simplifies policy creation, allowing you to quickly deploy a WAF and provide immediate powerful security. It also adapts policies through automatic learning to counter ever-changing threats hiding in (or targeting) http, https, and WebSocket traffic.<\/p>\n [\/et_pb_pricing_table][et_pb_pricing_table title=”Detailed application visibility and reporting” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}” sticky_transition=”on”]<\/p>\n Get detailed visibility into policy violations, potential attacks severity, and impact on servers. BIG-IP ASM also uses attack information and reports to identify threats, which become increasingly sophisticated as they evolve.<\/p>\n [\/et_pb_pricing_table][\/et_pb_pricing_tables][et_pb_pricing_tables show_bullet=”off” admin_label=”Blue Head Pricing” module_class=”blue-head-pricing” _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_pricing_table title=”Fast vulnerability correction” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}” sticky_transition=”on”]<\/p>\n BIG-IP ASM incorporates Dynamic Application Security Testing (DAST) tools to detect and correct vulnerabilities and unauthorized web changes before code fixes are available.<\/p>\n [\/et_pb_pricing_table][et_pb_pricing_table title=”Market-leading performance and scalability” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}” sticky_transition=”on”]<\/p>\n Ensure application availability, even under attack, and dynamically improve performance through application optimization and acceleration.<\/p>\n [\/et_pb_pricing_table][\/et_pb_pricing_tables][et_pb_text _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n Features<\/strong>:<\/p>\n [\/et_pb_text][et_pb_pricing_tables show_bullet=”off” admin_label=”Blue Head Pricing” module_class=”blue-head-pricing” _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_pricing_table title=”Protection against Layer 7 attacks” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}” sticky_transition=”on”]<\/p>\n Detects and reduces application attacks, including DOS and DDOS, brute force, SQL injection, cross-site scripting, remote file insertion, cookie poisoning, and session hijacking.<\/p>\n [\/et_pb_pricing_table][et_pb_pricing_table title=”Equipment identification” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}” sticky_transition=”on”]<\/p>\n Tracks each visitor\u2019s unique device ID across multiple IPs and sessions and through avoidance actions, for highly accurate blocking of malicious actors.<\/p>\n [\/et_pb_pricing_table][\/et_pb_pricing_tables][et_pb_pricing_tables show_bullet=”off” admin_label=”Blue Head Pricing” module_class=”blue-head-pricing” _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_pricing_table title=”Proactive defense against robots” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}” sticky_transition=”on”]<\/p>\n Identifies malicious bots that bypass standard detection methods and reduces threats with greater accuracy, before they begin.<\/p>\n [\/et_pb_pricing_table][et_pb_pricing_table title=”Application Perception” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}” sticky_transition=”on”]<\/p>\n By associating the application username with attacks, BIG-IP ASM makes it possible to block almost all attacks and better understand them.<\/p>\n [\/et_pb_pricing_table][\/et_pb_pricing_tables][et_pb_pricing_tables show_bullet=”off” admin_label=”Blue Head Pricing” module_class=”blue-head-pricing” _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_pricing_table title=”Data protection and cloaking (anonymization of data)” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}” sticky_transition=”on”]<\/p>\n Prevent leakage of sensitive data (credit card information, social security numbers) by completely eliminating data and masking the information.<\/p>\n [\/et_pb_pricing_table][et_pb_pricing_table title=”Incident clustering and attack correlation” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}” sticky_transition=”on”]<\/p>\n Automatically map multiple attacks into a single incident to improve visibility and facilitate management.<\/p>\n [\/et_pb_pricing_table][\/et_pb_pricing_tables][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner admin_label=”Elastic Secured Endpoint – 05″ _builder_version=”4.20.4″ _module_preset=”default” custom_padding=”0px||||false|false” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Cyber monitoring” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}”]<\/p>\n XMCO Serenity is a non-intrusive service for detecting attack attempts<\/strong> and leakage of sensitive information. The service covers all resources associated with the company: IP addresses, domains, brands, names, etc. and detects vulnerabilities in a preventive<\/strong> way. Before they are exploited by hackers: image damage, identity theft, uncontrolled exposure of the IS, data theft and leakage, etc.<\/p>\n [\/et_pb_blurb][et_pb_text _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”]Features<\/strong>:<\/p>\n [\/et_pb_text][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner admin_label=”Elastic Secured Endpoint – 06″ _builder_version=”4.20.4″ _module_preset=”default” custom_padding=”0px||||false|false” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Vulnerability audits” _builder_version=”4.21.0″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}”]<\/p>\n Qualys Vulnerability Management is a cloud service that provides immediate and global visibility<\/strong> into the vulnerabilities of your IT systems. And protects you from them. You can identify threats and monitor unplanned changes to your network before they become vulnerabilities:<\/p>\n [\/et_pb_blurb][et_pb_image src=”https:\/\/cegedim.cloud\/wp-content\/uploads\/2023\/12\/vulnerability-audits_en.jpg” title_text=”tests-vulnerabilite-qualys” _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][et_pb_text _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”]Features<\/strong>:<\/p>\n [\/et_pb_text][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner admin_label=”Elastic Secured Endpoint – 07″ _builder_version=”4.20.4″ _module_preset=”default” custom_padding=”0px||||false|false” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Detection and protection against DDoS attacks” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}”]<\/p>\n cegedim<\/span> .<\/span> cloud<\/span><\/strong> integrates into Elastic Secured Endpoint a detection and protection solution against DDoS attacks, including very high-capacity attacks, before they reach your network. This service provides multilayer protection (L3-L7), with cloud scanning technologies to detect, identify and prevent threats in real time<\/strong>. While routing legitimate traffic to your site. The fully managed<\/strong> solution is deployed and managed by our security experts.<\/p>\n [\/et_pb_blurb][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner column_structure=”1_2,1_2″ use_custom_gutter=”on” gutter_width=”2″ admin_label=”Elastic Secured Endpoint – 08″ _builder_version=”4.20.4″ _module_preset=”default” custom_padding=”0px||||false|false” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner type=”1_2″ saved_specialty_column_type=”3_4″ _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb image=”https:\/\/cegedim.cloud\/wp-content\/uploads\/2023\/05\/compute-platform-disaster-recovery-plan.svg” image_icon_width=”25%” admin_label=”Protection multi couches L3-L7″ _builder_version=”4.21.0″ _module_preset=”default” background_color=”#004666″ text_orientation=”center” background_layout=”dark” custom_padding=”30px|30px|30px|30px|false|false” custom_css_blurb_image=”filter: brightness(0) invert(1);||margin-bottom: 10px;” border_radii=”on|4px|4px|4px|4px” global_colors_info=”{}”]<\/p>\n L3-L7 multilayer protection<\/p>\n [\/et_pb_blurb][et_pb_blurb image=”https:\/\/cegedim.cloud\/wp-content\/uploads\/2023\/04\/shield-halved.svg” image_icon_width=”25%” admin_label=”Protection contre les attaques DNS” _builder_version=”4.21.0″ _module_preset=”default” background_color=”#e50046″ text_orientation=”center” background_layout=”dark” custom_padding=”30px|30px|30px|30px|false|false” custom_css_blurb_image=”filter: brightness(0) invert(1);||margin-bottom: 10px;” border_radii=”on|4px|4px|4px|4px” global_colors_info=”{}”]<\/p>\n Protection against DNS attacks<\/p>\n [\/et_pb_blurb][\/et_pb_column_inner][et_pb_column_inner type=”1_2″ saved_specialty_column_type=”3_4″ _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb image=”https:\/\/cegedim.cloud\/wp-content\/uploads\/2023\/05\/security-data-masking.svg” image_icon_width=”25%” admin_label=”Protection contre les attaques volum\u00e9triques” _builder_version=”4.21.0″ _module_preset=”default” background_color=”#4e81bd” text_orientation=”center” background_layout=”dark” custom_padding=”30px|30px|30px|30px|false|false” custom_css_blurb_image=”filter: brightness(0) invert(1);||margin-bottom: 10px;” border_radii=”on|4px|4px|4px|4px” global_colors_info=”{}”]<\/p>\n Protection against volumetric attacks<\/p>\n [\/et_pb_blurb][et_pb_blurb image=”https:\/\/cegedim.cloud\/wp-content\/uploads\/2023\/05\/app-virtualization-bis.svg” image_icon_width=”25%” admin_label=”Acheminement du trafic l\u00e9gitime” _builder_version=”4.21.0″ _module_preset=”default” background_color=”#706e6e” text_orientation=”center” background_layout=”dark” custom_padding=”30px|30px|30px|30px|false|false” custom_css_blurb_image=”filter: brightness(0) invert(1);||margin-bottom: 10px;” border_radii=”on|4px|4px|4px|4px” global_colors_info=”{}”]<\/p>\n Routing of legitimate traffic<\/p>\n [\/et_pb_blurb][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner admin_label=”Elastic Secured Endpoint – 09″ _builder_version=”4.20.4″ _module_preset=”default” custom_padding=”0px||||false|false” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Detection and protection against DDoS attacks” _builder_version=”4.20.4″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}”]<\/p>\n cegedim<\/span> .<\/span> cloud<\/span><\/strong> integrates into Elastic Secured Endpoint a detection and protection solution against DDoS attacks, including very high-capacity attacks, before they reach your network. This service provides multilayer protection (L3-L7), with cloud scanning technologies to detect, identify and prevent threats in real time<\/strong>. While routing legitimate traffic to your site. The fully managed<\/strong> solution is deployed and managed by our security experts.<\/p>\n [\/et_pb_blurb][et_pb_text _builder_version=”4.20.4″ _module_preset=”default” global_colors_info=”{}”]With anti DDoS<\/strong>:<\/p>\n [\/et_pb_text][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner admin_label=”Contact” _builder_version=”4.20.2″ _module_preset=”default” saved_tabs=”all” collapsed=”on” global_colors_info=”{}”][et_pb_column_inner _builder_version=”4.20.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Need more information about cegedim.cloud?” _builder_version=”4.21.0″ _module_preset=”default” header_level=”h2″ global_colors_info=”{}”]<\/p>\n If you would like to find out more about cegedim.cloud’s offerings<\/strong>, please contact us and an expert will get back to you as soon as possible.<\/p>\n\n
\n
\n
\n
\n
\n
\n
\n
\n
It transforms the chaotic volume of network traffic into logically assembled data flows. Then makes intelligent traffic management decisions, selecting the right destination based on server performance, security and availability.<\/p>\n\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n