{"id":3381,"date":"2021-09-26T07:57:52","date_gmt":"2021-09-26T07:57:52","guid":{"rendered":"https:\/\/stratign.com\/website\/?page_id=3381"},"modified":"2024-03-05T10:51:42","modified_gmt":"2024-03-05T06:51:42","slug":"cross-domain-security-solutions","status":"publish","type":"page","link":"https:\/\/www.stratign.com\/fr\/cross-domain-security-solutions\/","title":{"rendered":"SOLUTIONS DE S\u00c9CURIT\u00c9 MULTI-DOMAINES"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][tm_spacer size=&#8221;xs:20;sm:40;lg:80&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; text_transform=&#8221;uppercase&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243;]SOLUTIONS DE S\u00c9CURIT\u00c9 MULTI-DOMAINES[\/tm_heading][tm_spacer size=&#8221;xs:20;sm:30;lg:60&#8243;][\/vc_column][\/vc_row][vc_row sm_spacing=&#8221;padding_bottom:100&#8243; lg_spacing=&#8221;padding_bottom:5&#8243;][vc_column offset=&#8221;vc_col-md-5&#8243;][tm_heading style=&#8221;left-line&#8221; custom_google_font=&#8221;&#8221; font_weight=&#8221;800&#8243; font_size=&#8221;sm:18;md:21;lg:24&#8243; line_height=&#8221;1.67&#8243; max_width=&#8221;400px&#8221;]La segmentation du r\u00e9seau est un \u00e9l\u00e9ment important des concepts de s\u00e9curit\u00e9 informatique. La famille de produits de la transition s\u00e9curis\u00e9e du domaine (SDoT) permet l&#8217;\u00e9change contr\u00f4l\u00e9 unidirectionnel ou bidirectionnel de donn\u00e9es entre des r\u00e9seaux\/syst\u00e8mes de diff\u00e9rents niveaux de sensibilit\u00e9.[\/tm_heading][tm_spacer size=&#8221;xs:10;sm:10;lg:0&#8243;][\/vc_column][vc_column offset=&#8221;vc_col-md-7&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]La segmentation du r\u00e9seau est un \u00e9l\u00e9ment important des concepts de s\u00e9curit\u00e9 informatique. Les r\u00e9seaux organisationnels sont divis\u00e9s en segments en fonction des exigences de criticit\u00e9 et de sensibilit\u00e9 des donn\u00e9es et des syst\u00e8mes. Les segments de r\u00e9seau qui contiennent des donn\u00e9es particuli\u00e8rement sensibles (par exemple, classification nationale RESTRICTED ou SECRET) sont souvent isol\u00e9s (&#8220;air gapped&#8221;) ou accessibles par le biais de mod\u00e8les de communication et de flux de donn\u00e9es limit\u00e9s et impos\u00e9s.[\/tm_heading][tm_spacer size=&#8221;xs:10;lg:20&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]De m\u00eame, le mod\u00e8le de confiance z\u00e9ro se m\u00e9fie de tous les points finaux, de toutes les applications et de tous les utilisateurs. Toutes les communications internes et externes doivent \u00eatre v\u00e9rifi\u00e9es. Tout utilisateur ou service doit s&#8217;authentifier. De nombreux concepts de s\u00e9curit\u00e9 informatique se concentrent uniquement sur la minimisation des menaces externes, ce qui constitue une faiblesse exploit\u00e9e pour les cyberattaques.[\/tm_heading][\/vc_column][\/vc_row][vc_row sm_spacing=&#8221;margin_top:-90&#8243; xs_spacing=&#8221;margin_top:-90&#8243;][vc_column][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]C&#8217;est l\u00e0 qu&#8217;interviennent les solutions interdomaines (CDS). Il s&#8217;agit de composants de s\u00e9curit\u00e9 de r\u00e9seau hautement fiables et accr\u00e9dit\u00e9s par le gouvernement (par exemple, des passerelles de s\u00e9curit\u00e9, des diodes de donn\u00e9es) qui contr\u00f4lent et, si n\u00e9cessaire, bloquent le flux de donn\u00e9es entre deux domaines de s\u00e9curit\u00e9 \u00e0 tous les niveaux.[\/tm_heading][tm_spacer size=&#8221;xs:10;lg:20&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]La famille de produits de la transition s\u00e9curis\u00e9e du domaine (SDoT) permet l&#8217;\u00e9change contr\u00f4l\u00e9 unidirectionnel ou bidirectionnel de donn\u00e9es entre des r\u00e9seaux\/syst\u00e8mes de diff\u00e9rents niveaux de sensibilit\u00e9, ainsi que la cr\u00e9ation d&#8217;\u00e9tiquettes de s\u00e9curit\u00e9 inviolables et conformes \u00e0 la norme STANAG 4774\/8 de l&#8217;OTAN. La famille de produits SDoT offre les solutions interdomaines les plus compl\u00e8tes du march\u00e9 pour la s\u00e9curit\u00e9 des r\u00e9seaux et la pr\u00e9vention des fuites de donn\u00e9es (DLP). Les produits SDoT permettent la num\u00e9risation dans des domaines sensibles ou extr\u00eamement critiques, car les donn\u00e9es sont \u00e9chang\u00e9es et mises \u00e0 disposition de mani\u00e8re contr\u00f4l\u00e9e, tandis que les donn\u00e9es sensibles restent prot\u00e9g\u00e9es.[\/tm_heading][tm_spacer size=&#8221;lg:50&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243; css=&#8221;.vc_custom_1704777177092{background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221;]Caract\u00e9ristiques du syst\u00e8me[\/tm_heading][tm_spacer size=&#8221;lg:10&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<ul>\n<li>Assure une protection solide des donn\u00e9es sensibles gr\u00e2ce \u00e0 des mesures de s\u00e9curit\u00e9 renforc\u00e9es, notamment un module de s\u00e9curit\u00e9 mat\u00e9riel (HSM) durci.<\/li>\n<li>Assure la s\u00e9paration physique des composants pour emp\u00eacher tout acc\u00e8s non autoris\u00e9 et toute alt\u00e9ration, garantissant ainsi la s\u00e9paration du mat\u00e9riel.<\/li>\n<li>Comprend des mesures visant \u00e0 att\u00e9nuer et \u00e0 pr\u00e9venir les attaques DoS, afin de garantir un fonctionnement ininterrompu.<\/li>\n<li>Int\u00e8gre des pratiques et des protocoles d&#8217;administration s\u00e9curis\u00e9s afin d&#8217;emp\u00eacher tout acc\u00e8s non autoris\u00e9 et de pr\u00e9server l&#8217;int\u00e9grit\u00e9 des donn\u00e9es, garantissant ainsi une administration s\u00e9curis\u00e9e.<\/li>\n<li>Conforme aux normes de s\u00e9curit\u00e9 les plus \u00e9lev\u00e9es (niveau EAL4+), offrant un haut niveau d&#8217;assurance pour la protection des donn\u00e9es.<\/li>\n<li>Con\u00e7u pour fonctionner dans des conditions climatiques diverses, il convient \u00e0 diff\u00e9rents environnements.<\/li>\n<li>Construit avec des mesures de protection pour emp\u00eacher les infiltrations de poussi\u00e8re et assurer un fonctionnement fluide dans les environnements poussi\u00e9reux.<\/li>\n<li>Con\u00e7u pour r\u00e9sister aux chocs et aux vibrations, assurant des performances fiables m\u00eame dans des conditions difficiles.<\/li>\n<li>Utilise un syst\u00e8me d&#8217;exploitation s\u00e9curis\u00e9 avec un processus de d\u00e9marrage fiable (L4 Mikrokern OS avec Secure Boot), renfor\u00e7ant la s\u00e9curit\u00e9 du syst\u00e8me.<\/li>\n<\/ul>\n<p>[\/vc_column_text][tm_spacer size=&#8221;xs:30;sm:60;lg:120&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;none&#8221; lg_spacing=&#8221;margin_bottom:10&#8243; md_spacing=&#8221;margin_bottom:10&#8243;][vc_column width=&#8221;1\/4&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; css=&#8221;.vc_custom_1702534293059{margin-top: 10px !important;}&#8221;]En savoir plus[\/tm_heading][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_button button=&#8221;url:https%3A%2F%2Fwww.stratign.com%2Fcontact-us%2F|title:Nous%20contacter%20&#8243; el_id=&#8221;Contact-us-other&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221;]T\u00e9l\u00e9charger la brochure[\/tm_heading][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_button button=&#8221;url:https%3A%2F%2Fwww.stratign.com%2Fbrochures%2F|title:T%C3%A9l%C3%A9charger&#8221; el_id=&#8221;Brochure-other&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Network segmentation is an important element of IT security concepts. The Secure Domain Transition (SDoT) product family allows controlled unidirectional or bi-directional exchange of data between networks\/systems of different sensitivity level.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3381","page","type-page","status-publish","hentry","post-no-thumbnail"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SOLUTIONS DE S\u00c9CURIT\u00c9 MULTI-DOMAINES - Stratign<\/title>\n<meta name=\"description\" content=\"Les solutions de s\u00e9curit\u00e9 interdomaines permettent l&#039;\u00e9change contr\u00f4l\u00e9 unidirectionnel ou bidirectionnel de donn\u00e9es entre les syst\u00e8mes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratign.com\/fr\/cross-domain-security-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SOLUTIONS DE S\u00c9CURIT\u00c9 MULTI-DOMAINES - Stratign\" \/>\n<meta property=\"og:description\" content=\"Les solutions de s\u00e9curit\u00e9 interdomaines permettent l&#039;\u00e9change contr\u00f4l\u00e9 unidirectionnel ou bidirectionnel de donn\u00e9es entre les syst\u00e8mes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratign.com\/fr\/cross-domain-security-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratign\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/stratignfb\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-05T06:51:42+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@stratign\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/cross-domain-security-solutions\\\/\",\"url\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/cross-domain-security-solutions\\\/\",\"name\":\"SOLUTIONS DE S\u00c9CURIT\u00c9 MULTI-DOMAINES - Stratign\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/#website\"},\"datePublished\":\"2021-09-26T07:57:52+00:00\",\"dateModified\":\"2024-03-05T06:51:42+00:00\",\"description\":\"Les solutions de s\u00e9curit\u00e9 interdomaines permettent l'\u00e9change contr\u00f4l\u00e9 unidirectionnel ou bidirectionnel de donn\u00e9es entre les syst\u00e8mes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/cross-domain-security-solutions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stratign.com\\\/fr\\\/cross-domain-security-solutions\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/cross-domain-security-solutions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SOLUTIONS DE S\u00c9CURIT\u00c9 MULTI-DOMAINES\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/\",\"name\":\"Stratign\",\"description\":\"Military Defense Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SOLUTIONS DE S\u00c9CURIT\u00c9 MULTI-DOMAINES - Stratign","description":"Les solutions de s\u00e9curit\u00e9 interdomaines permettent l'\u00e9change contr\u00f4l\u00e9 unidirectionnel ou bidirectionnel de donn\u00e9es entre les syst\u00e8mes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratign.com\/fr\/cross-domain-security-solutions\/","og_locale":"en_US","og_type":"article","og_title":"SOLUTIONS DE S\u00c9CURIT\u00c9 MULTI-DOMAINES - Stratign","og_description":"Les solutions de s\u00e9curit\u00e9 interdomaines permettent l'\u00e9change contr\u00f4l\u00e9 unidirectionnel ou bidirectionnel de donn\u00e9es entre les syst\u00e8mes.","og_url":"https:\/\/www.stratign.com\/fr\/cross-domain-security-solutions\/","og_site_name":"Stratign","article_publisher":"https:\/\/www.facebook.com\/stratignfb\/","article_modified_time":"2024-03-05T06:51:42+00:00","twitter_card":"summary_large_image","twitter_site":"@stratign","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.stratign.com\/fr\/cross-domain-security-solutions\/","url":"https:\/\/www.stratign.com\/fr\/cross-domain-security-solutions\/","name":"SOLUTIONS DE S\u00c9CURIT\u00c9 MULTI-DOMAINES - Stratign","isPartOf":{"@id":"https:\/\/www.stratign.com\/fr\/#website"},"datePublished":"2021-09-26T07:57:52+00:00","dateModified":"2024-03-05T06:51:42+00:00","description":"Les solutions de s\u00e9curit\u00e9 interdomaines permettent l'\u00e9change contr\u00f4l\u00e9 unidirectionnel ou bidirectionnel de donn\u00e9es entre les syst\u00e8mes.","breadcrumb":{"@id":"https:\/\/www.stratign.com\/fr\/cross-domain-security-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratign.com\/fr\/cross-domain-security-solutions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratign.com\/fr\/cross-domain-security-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratign.com\/fr\/"},{"@type":"ListItem","position":2,"name":"SOLUTIONS DE S\u00c9CURIT\u00c9 MULTI-DOMAINES"}]},{"@type":"WebSite","@id":"https:\/\/www.stratign.com\/fr\/#website","url":"https:\/\/www.stratign.com\/fr\/","name":"Stratign","description":"Military Defense Technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratign.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/comments?post=3381"}],"version-history":[{"count":6,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3381\/revisions"}],"predecessor-version":[{"id":15147,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3381\/revisions\/15147"}],"wp:attachment":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/media?parent=3381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}