{"id":8563,"date":"2022-11-18T14:11:09","date_gmt":"2022-11-18T11:11:09","guid":{"rendered":"https:\/\/vasexperts.com\/?p=8563"},"modified":"2025-08-21T10:35:16","modified_gmt":"2025-08-21T07:35:16","slug":"cyberthreat-tracker-kaspersky-and-vas-experts-solution","status":"publish","type":"post","link":"https:\/\/vasexperts.com\/fr\/blog\/solution\/cyberthreat-tracker-kaspersky-and-vas-experts-solution\/","title":{"rendered":"Traqueur de cybermenaces est une solution de Kaspersky Lab et VAS Experts"},"content":{"rendered":"<h2>Quelles t\u00e2ches sont-elles r\u00e9solues par solution threat-intelligence ?<\/h2>\r\n<ul>\r\n \t<li>identification des abonn\u00e9s avec une activit\u00e9 virale<\/li>\r\n \t<li>identification des botnets \u00e0 un stade pr\u00e9coce<\/li>\r\n \t<li>support technique pr\u00e9ventif<\/li>\r\n \t<li>possibilit\u00e9 d\u2019offrir aux abonn\u00e9s des solutions modernes de protection des terminaux<\/li>\r\n \t<li>mise en \u0153uvre de la s\u00e9curit\u00e9 des appareils IoT.<\/li>\r\n<\/ul>\r\n<h2>Paysage des menaces<\/h2>\r\n\r\n<noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/11\/threats-fr.png\" alt=\"Paysage des menaces\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-8609\" srcset=\"\/wp-content\/uploads\/2022\/11\/threats-fr.png 1710w, \/wp-content\/uploads\/2022\/11\/threats-fr-300x108.png 300w, \/wp-content\/uploads\/2022\/11\/threats-fr-1024x368.png 1024w, \/wp-content\/uploads\/2022\/11\/threats-fr-768x276.png 768w, \/wp-content\/uploads\/2022\/11\/threats-fr-1536x552.png 1536w\" sizes=\"(max-width: 1710px) 100vw, 1710px\"><\/noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/11\/threats-fr.png\" alt=\"Paysage des menaces\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-8609 lazyload\" sizes=\"(max-width: 1710px) 100vw, 1710px\" data-src=\"\/wp-content\/uploads\/2022\/11\/threats-fr.png\" data-srcset=\"\/wp-content\/uploads\/2022\/11\/threats-fr.png 1710w, \/wp-content\/uploads\/2022\/11\/threats-fr-300x108.png 300w, \/wp-content\/uploads\/2022\/11\/threats-fr-1024x368.png 1024w, \/wp-content\/uploads\/2022\/11\/threats-fr-768x276.png 768w, \/wp-content\/uploads\/2022\/11\/threats-fr-1536x552.png 1536w\">\r\n\r\nLa recherche sur les cybermenaces dans Kaspersky Lab est effectu\u00e9e par l\u2019\u00e9quipe <a href=\"https:\/\/www.kaspersky.com\/about\/team\/great\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">GReAT \u2014 Global Research & Analysis Team<\/a>. Le chercheur principal des menaces \u00e0 la s\u00e9curit\u00e9, Viktor Chebyshev, nous a partag\u00e9 les statistiques acquises :\r\n\r\n<ul>\r\n \t<li>   <strong>  360 000   <\/strong>   nouvelles menaces de s\u00e9curit\u00e9 Internet apparaissent chaque jour<\/li>\r\n<li>les dommages moyens caus\u00e9s par une cyberattaque r\u00e9ussie sont de    <strong>  105 000 dollars   <\/strong>   pour les moyennes et petites entreprises et d\u2019environ    <strong>  1 million de dollars   <\/strong>   pour les Grandes entreprises<\/li>\r\n<li>   <strong>  tous   <\/strong>   les syst\u00e8mes d\u2019exploitation sont sensibles aux attaques<\/li>\r\n<li>chez les particuliers, les botnets volent des informations d\u2019identification, des donn\u00e9es de cartes bancaires et de portefeuilles cryptographiques ; chez les entreprises, il d\u00e9tournent l\u2019acc\u00e8s aux    <strong>  \u00e9l\u00e9ments d\u2019infrastructure critiques   <\/strong>   et des donn\u00e9es d\u2019entreprises (pour la vente ult\u00e9rieure et l\u2019espionnage industriel)<\/li>\r\n<li>Les attaques DDoS en 2022 \u00e9tablissent    <strong>  des records   <\/strong>   en nombre et en dur\u00e9e<\/li>\r\n<li>les vuln\u00e9rabilit\u00e9s de l\u2019IoT sont activement utilis\u00e9es pour les attaques DDoS et la construction d\u2019un r\u00e9seau de botnet \u2013    <strong>  tout appareil   <\/strong>   \u00e0 partir du routeur au moniteur pour b\u00e9b\u00e9 peut devenir une source d\u2019infection des p\u00e9riph\u00e9riques voisins du m\u00eame r\u00e9seau.<\/li>\r\n\r\n\r\n<\/ul>\r\n<h2>Traqueur de cybermenaces : composition de la solution<\/h2>\r\n\r\n<noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/11\/threat-intelligence-solution_%E2%80%94-fr.png\" alt=\"threat intelligence solution\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-8613\" srcset=\"\/wp-content\/uploads\/2022\/11\/threat-intelligence-solution_\u2014-fr.png 1167w, \/wp-content\/uploads\/2022\/11\/threat-intelligence-solution_\u2014-fr-300x252.png 300w, \/wp-content\/uploads\/2022\/11\/threat-intelligence-solution_\u2014-fr-1024x860.png 1024w, \/wp-content\/uploads\/2022\/11\/threat-intelligence-solution_\u2014-fr-768x645.png 768w\" sizes=\"(max-width: 1167px) 100vw, 1167px\"><\/noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/11\/threat-intelligence-solution_%E2%80%94-fr.png\" alt=\"threat intelligence solution\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-8613 lazyload\" sizes=\"(max-width: 1167px) 100vw, 1167px\" data-src=\"\/wp-content\/uploads\/2022\/11\/threat-intelligence-solution_\u2014-fr.png\" data-srcset=\"\/wp-content\/uploads\/2022\/11\/threat-intelligence-solution_\u2014-fr.png 1167w, \/wp-content\/uploads\/2022\/11\/threat-intelligence-solution_\u2014-fr-300x252.png 300w, \/wp-content\/uploads\/2022\/11\/threat-intelligence-solution_\u2014-fr-1024x860.png 1024w, \/wp-content\/uploads\/2022\/11\/threat-intelligence-solution_\u2014-fr-768x645.png 768w\">\r\n\r\n   <strong>  Pour mettre en \u0153uvre la solution threat-intelligence,   <\/strong>   nous avons combin\u00e9 les fonctionnalit\u00e9s de <a href=\"https:\/\/support.kaspersky.com\/datafeeds\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Kaspersky Threat Data Feeds<\/a>, qui regroupe les donn\u00e9es sur les menaces num\u00e9riques dans le monde entier, et du module d\u2019analyse et de police du trafic de Stingray. \r\n\r\n   <strong>  Kaspersky Threat Data Feeds   <\/strong>   est une base de donn\u00e9es structur\u00e9e, constamment mise \u00e0 jour et tr\u00e8s volumineuse d\u2019attaques DDoS, de sites de phishing, de botnets, de spam et d\u2019autres attaques malveillantes. Il existe 16 types de flux, Stingray fonctionne avec 7 d\u2019entre eux :\r\n<ol>\r\n \t<li>Malicious URL<\/li>\r\n \t<li>Phishing URL<\/li>\r\n \t<li>Botnet C&C<\/li>\r\n \t<li>Mobile Botnet<\/li>\r\n \t<li>IP Reputation<\/li>\r\n \t<li>Ransomware URL<\/li>\r\n \t<li>IoT URL Data<\/li>\r\n<\/ol>\r\n\u00c0 l\u2019aide de ses propres robots d\u2019exploration, pi\u00e8ges \u00e0 spam et syst\u00e8mes de surveillance des botnets, Kaspersky Threat Data Feeds, en tant que \u00ab laboratoire de virologie \u00bb, teste, analyse et collecte des donn\u00e9es sur toutes les cybermenaces connues dans un r\u00e9pertoire unique.\r\n\r\nPour la solution conjointe Kaspersky + VAS Experts, nous h\u00e9bergeons une copie synchronis\u00e9e de la base de donn\u00e9es sur les menaces sur le serveur avec les statistiques du comportement des abonn\u00e9s. \r\n\r\n   [important]  Ensuite, les statistiques du comportement des abonn\u00e9s sur Stingray sont compar\u00e9es \u00e0 la base de donn\u00e9es des menaces.    [\/important]  \r\n\r\nSur la base de la comparaison, une conclusion est faite sur les menaces potentielles au sein du r\u00e9seau de l\u2019op\u00e9rateur :\r\n<ul>\r\n \t<li>des caract\u00e9ristiques quantitatives sont r\u00e9v\u00e9l\u00e9es (degr\u00e9 d\u2019infection du r\u00e9seau \u2014 nombre d\u2019abonn\u00e9s et d\u2019appareils)<\/li>\r\n<li>et une liste des menaces d\u00e9tect\u00e9es et des connexions des abonn\u00e9s infect\u00e9s \u2014 pour que l\u2019administrateur r\u00e9seau puisse travailler avec des abonn\u00e9s sp\u00e9cifiques.<\/li>\r\n<\/ul>\r\n<h2>Comment utiliser ?<\/h2>\r\n\r\n<noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/11\/data-feeds-fr.png\" alt=\"Threats Data Feeds -Comment utiliser \" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-8592\" srcset=\"\/wp-content\/uploads\/2022\/11\/data-feeds-fr.png 1447w, \/wp-content\/uploads\/2022\/11\/data-feeds-fr-300x126.png 300w, \/wp-content\/uploads\/2022\/11\/data-feeds-fr-1024x431.png 1024w, \/wp-content\/uploads\/2022\/11\/data-feeds-fr-768x323.png 768w\" sizes=\"(max-width: 1447px) 100vw, 1447px\"><\/noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/11\/data-feeds-fr.png\" alt=\"Threats Data Feeds -Comment utiliser \" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-8592 lazyload\" sizes=\"(max-width: 1447px) 100vw, 1447px\" data-src=\"\/wp-content\/uploads\/2022\/11\/data-feeds-fr.png\" data-srcset=\"\/wp-content\/uploads\/2022\/11\/data-feeds-fr.png 1447w, \/wp-content\/uploads\/2022\/11\/data-feeds-fr-300x126.png 300w, \/wp-content\/uploads\/2022\/11\/data-feeds-fr-1024x431.png 1024w, \/wp-content\/uploads\/2022\/11\/data-feeds-fr-768x323.png 768w\">\r\n\r\nApr\u00e8s avoir d\u00e9termin\u00e9 le degr\u00e9 d\u2019infection du r\u00e9seau, l\u2019administrateur r\u00e9seau peut r\u00e9soudre les probl\u00e8mes \u00e0 l\u2019aide de Stingray.\r\n\r\n   <strong>  Solutions possibles :   <\/strong>  \r\n<ol>\r\n \t<li>restriction ou blocage plus stricte des abonn\u00e9s \u00e0 l\u2019aide de politiques sur BNG\/BRAS<\/li>\r\n<li>notification d\u2019un abonn\u00e9 de l\u2019activit\u00e9 suspecte de ses appareils, suivie d\u2019une offre d\u2019achat d\u2019un antivirus<\/li>\r\n<li>t\u00e9l\u00e9charger des donn\u00e9es sur les abonn\u00e9s infect\u00e9s pour les tester par des sp\u00e9cialistes du support technique, y compris la possibilit\u00e9 de revente.<\/li>\r\n<\/ol>\r\nLes deuxi\u00e8me et troisi\u00e8me options offrent la possibilit\u00e9 de mon\u00e9tiser davantage les services du fournisseur d\u2019acc\u00e8s Internet.\r\n\r\n   [important]  L\u2019impl\u00e9mentation du traqueur de menaces dans l\u2019architecture du r\u00e9seau de l\u2019op\u00e9rateur ne n\u00e9cessite pas l\u2019achat de nouveaux composants mat\u00e9riels et une configuration suppl\u00e9mentaire si le module de statistiques d\u2019abonn\u00e9s est d\u00e9j\u00e0 install\u00e9.   [\/important]  \r\n<h2>D\u00e9veloppement ult\u00e9rieur<\/h2>\r\n\u00c0 l\u2019heure actuelle, le traqueur de menaces est pilot\u00e9 dans un r\u00e9seau de plusieurs fournisseurs. Nous am\u00e9liorons    <strong>  la pr\u00e9cision de l\u2019identification des menaces   <\/strong>   et testons les options de r\u00e9ponse du fournisseur \u00e0 celles-ci. Une interface graphique conviviale pour la solution est \u00e9galement en cours de d\u00e9veloppement.\r\n\r\n   [important]  M\u00eame maintenant, le syst\u00e8me montre que, selon les flux, au moins 10% des m\u00e9nages ont des probl\u00e8mes de s\u00e9curit\u00e9.   [\/important]  \r\n\r\nNous accordons une attention particuli\u00e8re aux botnets et \u00e0 l\u2019IoT. Les flux contiennent les adresses des fermes bot. Avec leur aide, un abonn\u00e9 dont les appareils font d\u00e9sormais partie d\u2019un r\u00e9seau de botnet est d\u00e9tect\u00e9. La solution de Kaspersky Lab et VAS Experts permettra, au minimum, de d\u00e9terminer sa pr\u00e9sence dans un m\u00e9nage particulier et, au maximum, de d\u00e9tecter un appareil physique infect\u00e9, m\u00eame s\u2019il s\u2019agit d\u2019une machine \u00e0 caf\u00e9.\r\n\r\nNous esp\u00e9rons que notre solution Threat Intelligence aidera les fournisseurs d\u2019acc\u00e8s \u00e0 Internet    <strong>  \u00e0 r\u00e9soudre deux probl\u00e8mes en m\u00eame temps :   <\/strong>   la s\u00e9curit\u00e9 du r\u00e9seau et la mon\u00e9tisation suppl\u00e9mentaire de leurs services.\r\n\r\nPour plus de d\u00e9tails sur la mise en \u0153uvre, contactez nos sp\u00e9cialistes <a href=\"\/fr\/about\/contacts\/\">aux contacts indiqu\u00e9s sur notre site Web.<\/a>.\r\n\r\n[subscription id=\u00a0\u00bb11987\u2033]Abonnez-vous \u00e0 notre newsletter et restez inform\u00e9 des derniers d\u00e9veloppements et offres sp\u00e9ciales.[\/subscription]","protected":false},"excerpt":{"rendered":"<p>En combinant leur exp\u00e9rience dans l&rsquo;analyse du trafic et la d\u00e9tection des vuln\u00e9rabilit\u00e9s, Kaspersky et VAS Experts ont cr\u00e9\u00e9 une solution commune qui aidera les op\u00e9rateurs \u00e0 assurer la s\u00e9curit\u00e9 du r\u00e9seau et \u00e0 mon\u00e9tiser davantage leurs services.<\/p>\n","protected":false},"author":7,"featured_media":8579,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[110,46],"tags":[],"class_list":["post-8563","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-solution"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>(English) VASExperts<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vasexperts.com\/blog\/solution\/cyberthreat-tracker-kaspersky-and-vas-experts-solution\/\",\"url\":\"https:\/\/vasexperts.com\/blog\/solution\/cyberthreat-tracker-kaspersky-and-vas-experts-solution\/\",\"name\":\"[:en]Cyberthreat Tracker \u2014 Kaspersky and VAS Experts' Solution for Telecom Cybersecurity[:es]Tracker de ciberamenazas \u2014 una soluci\u00f3n de Kaspersky Lab y VAS Experts para la ciberseguridad en telecomunicaciones[:fr]Traqueur de cybermenaces est une solution de Kaspersky Lab et VAS Experts pour la cybers\u00e9curit\u00e9 des t\u00e9l\u00e9communications[:br]Cyberthreat Tracker \u2014 Solu\u00e7\u00e3o da Kaspersky e VAS Experts para a seguran\u00e7a cibern\u00e9tica nas telecomunica\u00e7\u00f5es\",\"isPartOf\":{\"@id\":\"https:\/\/vasexperts.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/solution\/cyberthreat-tracker-kaspersky-and-vas-experts-solution\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/solution\/cyberthreat-tracker-kaspersky-and-vas-experts-solution\/#primaryimage\"},\"thumbnailUrl\":\"\/wp-content\/uploads\/2022\/11\/telecom-security-day-kaspersky-e1669704913809.jpg\",\"datePublished\":\"2022-11-18T11:11:09+00:00\",\"dateModified\":\"2025-08-21T07:35:16+00:00\",\"author\":{\"@id\":\"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170\"},\"description\":\"[:en]Kaspersky Labs and VAS Experts have created a joint solution to ensure ISP's network security and additionally monetize their services.[:es]Kaspersky Lab y VAS Experts han creado una soluci\u00f3n conjunta que permitir\u00e1 a los operadores proteger su red y monetizar a\u00fan m\u00e1s sus servicios.[:fr]Kaspersky Lab et VAS Experts ont cr\u00e9\u00e9 une solution commune qui aidera les op\u00e9rateurs \u00e0 assurer la s\u00e9curit\u00e9 du r\u00e9seau et \u00e0 mon\u00e9tiser davantage leurs services.[:br]A Kaspersky Labs e a VAS Experts criaram uma solu\u00e7\u00e3o conjunta para garantir a seguran\u00e7a da rede dos ISPs e, al\u00e9m disso, monetizar seus servi\u00e7os.\",\"breadcrumb\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/solution\/cyberthreat-tracker-kaspersky-and-vas-experts-solution\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vasexperts.com\/blog\/solution\/cyberthreat-tracker-kaspersky-and-vas-experts-solution\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/vasexperts.com\/blog\/solution\/cyberthreat-tracker-kaspersky-and-vas-experts-solution\/#primaryimage\",\"url\":\"\/wp-content\/uploads\/2022\/11\/telecom-security-day-kaspersky-e1669704913809.jpg\",\"contentUrl\":\"\/wp-content\/uploads\/2022\/11\/telecom-security-day-kaspersky-e1669704913809.jpg\",\"width\":1696,\"height\":746,\"caption\":\"Telecom Security Solution\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vasexperts.com\/blog\/solution\/cyberthreat-tracker-kaspersky-and-vas-experts-solution\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430\",\"item\":\"https:\/\/vasexperts.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberthreat Tracker \u2014 Kaspersky and VAS Experts&#8217; Solution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vasexperts.com\/#website\",\"url\":\"https:\/\/vasexperts.com\/\",\"name\":\"ITGLOBAL.COM\",\"description\":\"(English) VASExperts\",\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170\",\"name\":\"Elena Rudich\",\"url\":\"https:\/\/vasexperts.com\/fr\/blog\/author\/elena-rudich\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"(English) VASExperts","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/vasexperts.com\/blog\/solution\/cyberthreat-tracker-kaspersky-and-vas-experts-solution\/","url":"https:\/\/vasexperts.com\/blog\/solution\/cyberthreat-tracker-kaspersky-and-vas-experts-solution\/","name":"[:en]Cyberthreat Tracker \u2014 Kaspersky and VAS Experts' Solution for Telecom Cybersecurity[:es]Tracker de ciberamenazas \u2014 una soluci\u00f3n de Kaspersky Lab y VAS Experts para la ciberseguridad en telecomunicaciones[:fr]Traqueur de cybermenaces est une solution de Kaspersky Lab et VAS Experts pour la cybers\u00e9curit\u00e9 des t\u00e9l\u00e9communications[:br]Cyberthreat Tracker \u2014 Solu\u00e7\u00e3o da Kaspersky e VAS Experts para a seguran\u00e7a cibern\u00e9tica nas telecomunica\u00e7\u00f5es","isPartOf":{"@id":"https:\/\/vasexperts.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/vasexperts.com\/blog\/solution\/cyberthreat-tracker-kaspersky-and-vas-experts-solution\/#primaryimage"},"image":{"@id":"https:\/\/vasexperts.com\/blog\/solution\/cyberthreat-tracker-kaspersky-and-vas-experts-solution\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2022\/11\/telecom-security-day-kaspersky-e1669704913809.jpg","datePublished":"2022-11-18T11:11:09+00:00","dateModified":"2025-08-21T07:35:16+00:00","author":{"@id":"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170"},"description":"[:en]Kaspersky Labs and VAS Experts have created a joint solution to ensure ISP's network security and additionally monetize their services.[:es]Kaspersky Lab y VAS Experts han creado una soluci\u00f3n conjunta que permitir\u00e1 a los operadores proteger su red y monetizar a\u00fan m\u00e1s sus servicios.[:fr]Kaspersky Lab et VAS Experts ont cr\u00e9\u00e9 une solution commune qui aidera les op\u00e9rateurs \u00e0 assurer la s\u00e9curit\u00e9 du r\u00e9seau et \u00e0 mon\u00e9tiser davantage leurs services.[:br]A Kaspersky Labs e a VAS Experts criaram uma solu\u00e7\u00e3o conjunta para garantir a seguran\u00e7a da rede dos ISPs e, al\u00e9m disso, monetizar seus servi\u00e7os.","breadcrumb":{"@id":"https:\/\/vasexperts.com\/blog\/solution\/cyberthreat-tracker-kaspersky-and-vas-experts-solution\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vasexperts.com\/blog\/solution\/cyberthreat-tracker-kaspersky-and-vas-experts-solution\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/vasexperts.com\/blog\/solution\/cyberthreat-tracker-kaspersky-and-vas-experts-solution\/#primaryimage","url":"\/wp-content\/uploads\/2022\/11\/telecom-security-day-kaspersky-e1669704913809.jpg","contentUrl":"\/wp-content\/uploads\/2022\/11\/telecom-security-day-kaspersky-e1669704913809.jpg","width":1696,"height":746,"caption":"Telecom Security Solution"},{"@type":"BreadcrumbList","@id":"https:\/\/vasexperts.com\/blog\/solution\/cyberthreat-tracker-kaspersky-and-vas-experts-solution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430","item":"https:\/\/vasexperts.com\/"},{"@type":"ListItem","position":2,"name":"Cyberthreat Tracker \u2014 Kaspersky and VAS Experts&#8217; Solution"}]},{"@type":"WebSite","@id":"https:\/\/vasexperts.com\/#website","url":"https:\/\/vasexperts.com\/","name":"ITGLOBAL.COM","description":"(English) VASExperts","inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170","name":"Elena Rudich","url":"https:\/\/vasexperts.com\/fr\/blog\/author\/elena-rudich\/"}]}},"_links":{"self":[{"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/posts\/8563"}],"collection":[{"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/comments?post=8563"}],"version-history":[{"count":10,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/posts\/8563\/revisions"}],"predecessor-version":[{"id":13101,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/posts\/8563\/revisions\/13101"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/media\/8579"}],"wp:attachment":[{"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/media?parent=8563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/categories?post=8563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/tags?post=8563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}