[{"data":1,"prerenderedAt":321},["ShallowReactive",2],{"NyaWZlDZji":3,"f4YZxShMWE":29,"M2b3W9nJ8B":43,"DSqVzzni5S":59,"dMJASGPuKR":76,"VfijuwgdUa":93,"62ObUmzhXS":110,"lYwR74rkJh":121,"QQUHAoP0b4":135,"0lNADDmX0w":149,"47DEQpj8HB":166,"WDwzuaX9AA":172,"Yt0IIsg9C2":204,"tOgQsMWOEQ":221,"id6jZ9GFdp":240,"goR2IkCmnG":264,"rJRLO4coAt":280,"8F0UpmC9v1":297},{"data":4,"body":7,"excerpt":-1,"toc":26},{"title":5,"description":6},"","Omniac : la Cyber Intelligence pour votre entreprise",{"type":8,"children":9},"root",[10],{"type":11,"tag":12,"props":13,"children":14},"element","p",{},[15,18,24],{"type":16,"value":17},"text","Omniac : la ",{"type":11,"tag":19,"props":20,"children":21},"strong",{},[22],{"type":16,"value":23},"Cyber Intelligence",{"type":16,"value":25}," pour votre entreprise",{"title":5,"searchDepth":27,"depth":27,"links":28},2,[],{"data":30,"body":32,"excerpt":-1,"toc":41},{"title":5,"description":31},"Détectez rapidement les vols d’identité et de données. Identifiez les surfaces d’attaque globales avant que les cybercriminels ne puissent frapper.",{"type":8,"children":33},[34],{"type":11,"tag":12,"props":35,"children":36},{},[37],{"type":11,"tag":19,"props":38,"children":39},{},[40],{"type":16,"value":31},{"title":5,"searchDepth":27,"depth":27,"links":42},[],{"data":44,"body":46,"excerpt":-1,"toc":57},{"title":5,"description":45},"Omniac surveille en permanence les données d’accès présentes sur Internet et le Dark Web ainsi que les surfaces d’attaque extérieures non invasives. Nous vous informons immédiatement en cas d’usurpations d’identité, de shadow IT et de vulnérabilités.",{"type":8,"children":47},[48,52],{"type":11,"tag":12,"props":49,"children":50},{},[51],{"type":16,"value":45},{"type":11,"tag":12,"props":53,"children":54},{},[55],{"type":16,"value":56},"Vous pouvez ainsi éviter les usurpations de compte (Account Take Over) et améliorer vos défenses.",{"title":5,"searchDepth":27,"depth":27,"links":58},[],{"data":60,"body":62,"excerpt":-1,"toc":74},{"title":5,"description":61},"Tous les secteurs, partout dans le monde.",{"type":8,"children":63},[64],{"type":11,"tag":12,"props":65,"children":66},{},[67,69],{"type":16,"value":68},"Tous les secteurs, ",{"type":11,"tag":19,"props":70,"children":71},{},[72],{"type":16,"value":73},"partout dans le monde.",{"title":5,"searchDepth":27,"depth":27,"links":75},[],{"data":77,"body":79,"excerpt":-1,"toc":91},{"title":5,"description":78},"Vos avantages",{"type":8,"children":80},[81],{"type":11,"tag":12,"props":82,"children":83},{},[84,86],{"type":16,"value":85},"Vos ",{"type":11,"tag":19,"props":87,"children":88},{},[89],{"type":16,"value":90},"avantages",{"title":5,"searchDepth":27,"depth":27,"links":92},[],{"data":94,"body":96,"excerpt":-1,"toc":108},{"title":5,"description":95},"Cyber Threat Intelligence et protection d’identité complètes",{"type":8,"children":97},[98],{"type":11,"tag":12,"props":99,"children":100},{},[101,106],{"type":11,"tag":19,"props":102,"children":103},{},[104],{"type":16,"value":105},"Cyber Threat Intelligence",{"type":16,"value":107}," et protection d’identité complètes",{"title":5,"searchDepth":27,"depth":27,"links":109},[],{"data":111,"body":113,"excerpt":-1,"toc":119},{"title":5,"description":112},"Gestion de la surface d’attaque externe (EASM)",{"type":8,"children":114},[115],{"type":11,"tag":12,"props":116,"children":117},{},[118],{"type":16,"value":112},{"title":5,"searchDepth":27,"depth":27,"links":120},[],{"data":122,"body":124,"excerpt":-1,"toc":133},{"title":5,"description":123},"Prévention en Credential Intelligence et d’usurpation de compte (Account Take Over ou « ATO »)",{"type":8,"children":125},[126],{"type":11,"tag":12,"props":127,"children":128},{},[129],{"type":11,"tag":19,"props":130,"children":131},{},[132],{"type":16,"value":123},{"title":5,"searchDepth":27,"depth":27,"links":134},[],{"data":136,"body":138,"excerpt":-1,"toc":147},{"title":5,"description":137},"Protection contre les risques numériques",{"type":8,"children":139},[140],{"type":11,"tag":12,"props":141,"children":142},{},[143],{"type":11,"tag":19,"props":144,"children":145},{},[146],{"type":16,"value":137},{"title":5,"searchDepth":27,"depth":27,"links":148},[],{"data":150,"body":152,"excerpt":-1,"toc":164},{"title":5,"description":151},"Surveillance des données via un tableau de bord Web et une API",{"type":8,"children":153},[154],{"type":11,"tag":12,"props":155,"children":156},{},[157,159],{"type":16,"value":158},"Surveillance des données via ",{"type":11,"tag":19,"props":160,"children":161},{},[162],{"type":16,"value":163},"un tableau de bord Web et une API",{"title":5,"searchDepth":27,"depth":27,"links":165},[],{"data":167,"body":168,"excerpt":-1,"toc":170},{"title":5,"description":5},{"type":8,"children":169},[],{"title":5,"searchDepth":27,"depth":27,"links":171},[],{"data":173,"body":175,"excerpt":-1,"toc":202},{"title":5,"description":174},"Tableau de bord Web",{"type":8,"children":176},[177,184,189,197],{"type":11,"tag":12,"props":178,"children":179},{},[180],{"type":11,"tag":19,"props":181,"children":182},{},[183],{"type":16,"value":174},{"type":11,"tag":12,"props":185,"children":186},{},[187],{"type":16,"value":188},"Notre tableau de bord vous permet de définir les données et domaines à surveiller. Les résultats des scans non invasifs répétés quotidiennement s’affichent dans des tableaux de bord clairs. Vous pouvez également configurer des avertissements automatiques et analyser les données brutes. Gardez constamment un œil sur l’état de la menace, sans intégration.",{"type":11,"tag":12,"props":190,"children":191},{},[192],{"type":11,"tag":19,"props":193,"children":194},{},[195],{"type":16,"value":196},"Connexion individuelle (API)",{"type":11,"tag":12,"props":198,"children":199},{},[200],{"type":16,"value":201},"Grâce à notre API, automatisez la surveillance continue des données personnelles de vos clients et collaborateurs sur le Dark Web, le Deep Web et Internet. Pour permettre une intégration individuelle dans votre environnement système existant, nous vous fournissons une API bien documentée et vous accompagnons pendant l’implémentation.",{"title":5,"searchDepth":27,"depth":27,"links":203},[],{"data":205,"body":207,"excerpt":-1,"toc":219},{"title":5,"description":206},"Omniac surveille l'ensemble des domaines de votre entreprise et de vos partenaires.",{"type":8,"children":208},[209],{"type":11,"tag":12,"props":210,"children":211},{},[212,214],{"type":16,"value":213},"Omniac surveille ",{"type":11,"tag":19,"props":215,"children":216},{},[217],{"type":16,"value":218},"l'ensemble des domaines de votre entreprise et de vos partenaires.",{"title":5,"searchDepth":27,"depth":27,"links":220},[],{"data":222,"body":224,"excerpt":-1,"toc":238},{"title":5,"description":223},"Le tableau de bord Web vous permet de garder constamment un œil sur l’état des menaces.",{"type":8,"children":225},[226],{"type":11,"tag":12,"props":227,"children":228},{},[229,231,236],{"type":16,"value":230},"Le ",{"type":11,"tag":19,"props":232,"children":233},{},[234],{"type":16,"value":235},"tableau de bord Web",{"type":16,"value":237}," vous permet de garder constamment un œil sur l’état des menaces.",{"title":5,"searchDepth":27,"depth":27,"links":239},[],{"data":241,"body":243,"excerpt":-1,"toc":262},{"title":5,"description":242},"Vos données. Notre responsabilité.",{"type":8,"children":244},[245],{"type":11,"tag":12,"props":246,"children":247},{},[248,253,255,260],{"type":11,"tag":19,"props":249,"children":250},{},[251],{"type":16,"value":252},"Vos",{"type":16,"value":254}," données. ",{"type":11,"tag":19,"props":256,"children":257},{},[258],{"type":16,"value":259},"Notre",{"type":16,"value":261}," responsabilité.",{"title":5,"searchDepth":27,"depth":27,"links":263},[],{"data":265,"body":267,"excerpt":-1,"toc":278},{"title":5,"description":266},"Nous respectons pleinement les exigences du Règlement général sur la protection des données (RGPD) et n’avons aucun accès aux données saisies ou transmises.",{"type":8,"children":268},[269,273],{"type":11,"tag":12,"props":270,"children":271},{},[272],{"type":16,"value":266},{"type":11,"tag":12,"props":274,"children":275},{},[276],{"type":16,"value":277},"Dans l’application omniac, nous hachons, masquons et cryptons vos données, aussi bien lors de la transmission que pendant le stockage. Le développement et l’hébergement ont lieu sur le Cloud STACKIT sécurisé en Allemagne.",{"title":5,"searchDepth":27,"depth":27,"links":279},[],{"data":281,"body":283,"excerpt":-1,"toc":295},{"title":5,"description":282},"Convaincu par la Cyber Intelligence d’omniac ?",{"type":8,"children":284},[285],{"type":11,"tag":12,"props":286,"children":287},{},[288,290],{"type":16,"value":289},"Convaincu par la ",{"type":11,"tag":19,"props":291,"children":292},{},[293],{"type":16,"value":294},"Cyber Intelligence d’omniac ?",{"title":5,"searchDepth":27,"depth":27,"links":296},[],{"data":298,"body":300,"excerpt":-1,"toc":319},{"title":5,"description":299},"Détecter les vols de données. Prévenir la fraude. Renforcer la confiance.",{"type":8,"children":301},[302,309,314],{"type":11,"tag":12,"props":303,"children":304},{},[305],{"type":11,"tag":19,"props":306,"children":307},{},[308],{"type":16,"value":299},{"type":11,"tag":12,"props":310,"children":311},{},[312],{"type":16,"value":313},"Contactez-nous pour obtenir des informations détaillées sur l’étendue des prestations, les options d’intégration et les prix.\nNous nous réjouissons d’échanger avec vous à ce sujet.",{"type":11,"tag":12,"props":315,"children":316},{},[317],{"type":16,"value":318},"Envoyez-nous un e-mail à:",{"title":5,"searchDepth":27,"depth":27,"links":320},[],1773848248740]