{"id":10507,"date":"2021-06-11T11:16:17","date_gmt":"2021-06-11T09:16:17","guid":{"rendered":"http:\/\/blog.actn.fr\/?p=10507"},"modified":"2021-06-11T11:16:17","modified_gmt":"2021-06-11T09:16:17","slug":"le-label-cybersecurity-made-in-europe-de-lecso-decerne-a-g-data","status":"publish","type":"post","link":"https:\/\/blog.actn.fr\/?p=10507","title":{"rendered":"Le label Cybersecurity Made in Europe de l&#039;ECSO d\u00e9cern\u00e9 \u00e0 G DATA"},"content":{"rendered":"<p>\t\t\t\t<![CDATA[<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5643\" src=\"http:\/\/blog.actn.fr\/wp-content\/uploads\/2017\/09\/Logo-G-DATA-2017.png\" alt=\"\" width=\"305\" height=\"200\" \/>\n\n\n<p style=\"text-align: justify;\"><strong>Le label atteste de la confiance accord\u00e9e au fournisseur europ\u00e9en de services de cyberd\u00e9fense.<\/strong><\/p>\n\n\n\n\n<p style=\"text-align: justify;\">G DATA CyberDefense est l&rsquo;une des premi\u00e8res entreprises de s\u00e9curit\u00e9 \u00e0 se voir d\u00e9cerner le label Cybersecurity Made in Europe par l&rsquo;Organisation europ\u00e9enne de cybers\u00e9curit\u00e9 (ECSO). <strong>Ce label de reconnaissance vient confirmer la fiabilit\u00e9 des fabricants europ\u00e9ens de produits de s\u00e9curit\u00e9 et l&rsquo;autonomie num\u00e9rique europ\u00e9enne.<\/strong> G DATA est un \u00e9diteur de solutions de s\u00e9curit\u00e9 informatique fiable et digne de confiance, et cette distinction vient \u00e9tayer sa garantie \u00ab\u00a0<strong>No Backdoor<\/strong>\u00a0\u00bb dans toute l&rsquo;Europe.<\/p>\n\n\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10508\" src=\"http:\/\/blog.actn.fr\/wp-content\/uploads\/2021\/06\/ECSO_Label_OGtag.jpg\" alt=\"\" width=\"1200\" height=\"630\" \/>\n\n\n<div id=\"c216029\" class=\"fce column large-12 small-12 frame-layout-0 \">\n\n\n<p style=\"text-align: justify;\">Le label ECSO Cybersecurity Made in Europe donne \u00e0 G DATA un certificat europ\u00e9en attestant que la soci\u00e9t\u00e9 de s\u00e9curit\u00e9 informatique est digne de confiance. Ce label fait r\u00e9f\u00e9rence aux exigences \u00e9lev\u00e9es en mati\u00e8re de protection et de s\u00e9curit\u00e9 des donn\u00e9es dans l&rsquo;UE. L&rsquo;Agence de l&rsquo;Union europ\u00e9enne pour la cybers\u00e9curit\u00e9 (ENISA) a \u00e9dict\u00e9 des crit\u00e8res de s\u00e9curit\u00e9 de base tr\u00e8s rigoureux, auxquels il est indispensable de se conformer pour que les produits et services soient consid\u00e9r\u00e9s comme s\u00fbrs.<\/p>\n\n\n\n\n<p style=\"text-align: justify;\">Le label ECSO prolonge au niveau europ\u00e9en ce que l&rsquo;initiative IT Security Made in Germany (ITSMIG) a commenc\u00e9 il y a longtemps. Il inclut \u00e9galement une clause \u00ab\u00a0No Backdoor\u00a0\u00bb et oblige les fabricants de solutions de s\u00e9curit\u00e9 informatique \u00e0 se conformer aux normes de s\u00e9curit\u00e9 europ\u00e9ennes \u00e9lev\u00e9es et \u00e0 mettre en \u0153uvre les exigences en mati\u00e8re de protection de la vie priv\u00e9e pr\u00e9vues par le <strong>GDPR<\/strong>.<\/p>\n\n\n&nbsp;\n\n<\/div>\n\n\n\n\n<div id=\"c216032\" class=\"fce column large-12 small-12 frame-layout-0 \">\n\n<header class=\" \">\n\n\n<h3 class=\" \"><span style=\"color: #000000;\">Les d\u00e9tenteurs du label ECSO r\u00e9pondent aux crit\u00e8res suivants<\/span><\/h3>\n\n\n<\/header>\n\n\n\n\n<ul class=\"csc-bulletlist-1\">\n \t\n\n<li>le si\u00e8ge social de l&rsquo;entreprise est situ\u00e9 en Europe<\/li>\n\n\n \t\n\n<li>la majorit\u00e9 des employ\u00e9s sont employ\u00e9s en Europe<\/li>\n\n\n \t\n\n<li>le march\u00e9 principal est l&rsquo;Europe<\/li>\n\n\n \t\n\n<li>le respect des 12 exigences de s\u00e9curit\u00e9 de base sp\u00e9cifi\u00e9es par l&rsquo;ENISA comme essentielles pour que les produits et services dans le domaine des technologies de l&rsquo;information et de la communication soient consid\u00e9r\u00e9s comme s\u00fbrs &#8211;\u00a0<a href=\"https:\/\/www.enisa.europa.eu\/publications\/indispensable-baseline-security-requirements-for-the-procurement-of-secure-ict-products-and-services\" target=\"_blank\" rel=\"noopener noreferrer\">pour le t\u00e9l\u00e9chargement<\/a><\/li>\n\n\n<\/ul>\n\n\n<\/div>\n\n\n\n\n<div id=\"c216033\" class=\"fce column large-12 small-12 frame-layout-0 \">\n\n&nbsp;\n\n\n<p style=\"text-align: justify;\">G DATA r\u00e9pond \u00e0 tous les crit\u00e8res n\u00e9cessaires \u00e0 l&rsquo;obtention du label. L&rsquo;entreprise de cyberd\u00e9fense con\u00e7oit et d\u00e9veloppe toutes ses solutions et tous services de s\u00e9curit\u00e9 exclusivement en Allemagne, \u00e0 son si\u00e8ge de Bochum.<\/p>\n\n\n\n<\/div>\n\n\n&nbsp;\n\n\n<h3><span style=\"color: #000000;\"><strong>D\u00e9couvrez la gamme G DATA disponible chez ACTN<\/strong><\/span><\/h3>\n\n\n<img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-10509 aligncenter\" src=\"http:\/\/blog.actn.fr\/wp-content\/uploads\/2021\/06\/GDAT-ENDPOINTSECURITYBUSINESSMATRIX.jpg\" alt=\"\" width=\"700\" height=\"526\" \/>\n\n\n<div align=\"center\"><span style=\"border: 1px solid #D96045; padding: 10px;\"><strong><a href=\"https:\/\/urlr.me\/NvmBV\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-size: 20px;\">Acheter une solution G DATA \u00bb<\/span><\/a><\/strong><\/span><\/div>\n\n\n\n\n<h3><\/h3>\n\n\n\n\n<h3><span style=\"color: #000000;\"><strong>Pensez-y !<\/strong> La gamme G DATA est aussi disponible en mode manag\u00e9 (MSP) chez ACTN\n<\/span><\/h3>\n\n\n\n\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.actn.fr\/actn\/obj-display?url=https:%2F%2Fwww.actn.fr%2Fbackend%2Fplaquettes%2F%2FGDATA-ANTIVIRUS-MSP-FLYER-2021.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10510 size-full\" src=\"http:\/\/blog.actn.fr\/wp-content\/uploads\/2021\/06\/msp-gdata.jpg\" alt=\"\" width=\"1046\" height=\"120\" \/><\/a><\/p>\n\n\n&nbsp;\n\n\n<h3><span id=\"result_box\" class=\"\" lang=\"fr\"><strong><span class=\"\">+ D\u2019INFO\n<\/span><\/strong><\/span><\/h3>\n\n\n<a href=\"https:\/\/www.gdata.fr\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>En savoir + sur G DATA \u00bb<\/strong><\/a>\nPour en savoir davantage sur la gamme cybers\u00e9curit\u00e9 d\u2019ACTN, contactez notre service commercial <strong>05 62 488 488.<\/strong>]]>\t\t<\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<a href=\"https:\/\/blog.actn.fr\/?p=10507\"><\/a><p>\t\t\t\t<![CDATA[]]>\t\t<!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":2,"featured_media":10511,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[72],"tags":[149,332,471,550],"class_list":["post-10507","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-g-data","tag-antivirus","tag-cybersecurite","tag-endpoint","tag-g-data"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.actn.fr\/index.php?rest_route=\/wp\/v2\/posts\/10507","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.actn.fr\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.actn.fr\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.actn.fr\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.actn.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10507"}],"version-history":[{"count":0,"href":"https:\/\/blog.actn.fr\/index.php?rest_route=\/wp\/v2\/posts\/10507\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.actn.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.actn.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10507"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.actn.fr\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}