{"id":3261,"date":"2021-06-16T15:42:04","date_gmt":"2021-06-16T15:42:04","guid":{"rendered":"https:\/\/cyberwatch.fr\/our-platform\/"},"modified":"2021-07-28T09:40:00","modified_gmt":"2021-07-28T09:40:00","slug":"our-platform","status":"publish","type":"page","link":"https:\/\/cyberwatch.fr\/en\/our-platform\/","title":{"rendered":"Our platform"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Hero Section&#8221; _builder_version=&#8221;4.9.4&#8243; background_color_gradient_direction=&#8221;100deg&#8221; background_image=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/06\/Header_NotrePlateforme.png&#8221; custom_padding=&#8221;40px||40px||true|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px||30px||true|false&#8221;][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_module=&#8221;2861&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][lwp_divi_breadcrumbs home_text=&#8221;Accueil&#8221; font_icon=&#8221;%%20%%&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][\/lwp_divi_breadcrumbs][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||||false|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_line_height=&#8221;1.3em&#8221; width=&#8221;80%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;&#8221; header_font_size_phone=&#8221;25px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; max_width=&#8221;100%&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1>A platform to monitor your vulnerabilities and your compliance, from detection to remediation, agent-based or agentless<\/h1>\n<p>Our platform helps you to find, prioritize, and fix your vulnerabilities and your compliance.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@&#8221; button_text=&#8221;Get a free demo&#8221; button_alignment=&#8221;left&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#321fdb&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;RGBA(0,0,0,0)&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Poppins||||||||&#8221; button_icon=&#8221;%%3%%&#8221; button_icon_color=&#8221;#ffffff&#8221; button_on_hover=&#8221;off&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|35px|10px|35px|false|true&#8221; global_module=&#8221;2108&#8243; saved_tabs=&#8221;all&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#301abf&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;B\u00e9n\u00e9fices&#8221; _builder_version=&#8221;4.9.4&#8243; background_color=&#8221;#f8f7fc&#8221; background_enable_image=&#8221;off&#8221; background_position=&#8221;top_center&#8221; custom_padding=&#8221;40px||30px|0px|false|&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px||30px||true|false&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; admin_label=&#8221;Services Area&#8221; _builder_version=&#8221;4.9.4&#8243; min_height=&#8221;92.7px&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/eye-1.png&#8221; alt=&#8221;Cyberwatch maps your information system, searches for new assets to scan, and helps you to fight against Shadow IT&#8221; title_text=&#8221;Get a complete view of your assets&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.9.4&#8243; max_width=&#8221;15%&#8221; module_alignment=&#8221;center&#8221; max_height=&#8221;15%&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; max_width_last_edited=&#8221;on|tablet&#8221; max_width_tablet=&#8221;10%&#8221;][\/et_pb_image][et_pb_cta title=&#8221;Get a complete view of your assets&#8221; button_url=&#8221;#&#8221; admin_label=&#8221;Service&#8221; _builder_version=&#8221;4.9.4&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#321FDB&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_align=&#8221;center&#8221; body_text_color=&#8221;#636F83&#8243; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; use_background_color=&#8221;off&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#8b20bb&#8221; button_bg_color=&#8221;rgba(0,0,0,0)&#8221; button_border_width=&#8221;0px&#8221; button_letter_spacing=&#8221;2px&#8221; button_font=&#8221;Poppins|600||on|||||&#8221; button_icon=&#8221;%%3%%&#8221; button_alignment=&#8221;left&#8221; text_orientation=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;15px||0px||false|false&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;]<\/p>\n<p>Cyberwatch maps your information system, searches for new assets to scan, and helps you to fight against Shadow IT<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/server.png&#8221; alt=&#8221;Cyberwatch detects and prioritizes vulnerabilities in your information system, and can deploy the appropriate security patches to improve your security&#8221; title_text=&#8221;Vulnerability Management&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.9.4&#8243; max_width=&#8221;15%&#8221; custom_margin=&#8221;||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243; max_width_last_edited=&#8221;on|tablet&#8221; max_width_tablet=&#8221;10%&#8221;][\/et_pb_image][et_pb_cta title=&#8221;Manage easily vulnerabilities in your information system&#8221; button_url=&#8221;#&#8221; admin_label=&#8221;Service&#8221; _builder_version=&#8221;4.9.4&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Poppins|500|||||||&#8221; header_text_color=&#8221;#321FDB&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_color=&#8221;#3C4B64&#8243; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; use_background_color=&#8221;off&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#8b20bb&#8221; button_bg_color=&#8221;rgba(0,0,0,0)&#8221; button_border_width=&#8221;0px&#8221; button_letter_spacing=&#8221;2px&#8221; button_font=&#8221;Poppins|600||on|||||&#8221; button_icon=&#8221;%%3%%&#8221; button_alignment=&#8221;left&#8221; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;15px||0px||false|false&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;]<\/p>\n<p>Cyberwatch detects and prioritizes vulnerabilities in your information system, and can deploy the appropriate security patches to improve your security <\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/browser.png&#8221; alt=&#8221;Cyberwatch checks your assets against cybersecurity best practices, based on international standards that you can customize, and helps you build a valid in-depth defense.&#8221; title_text=&#8221;Best practices for cybersecurity&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.9.4&#8243; max_width=&#8221;15%&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; max_width_last_edited=&#8221;on|tablet&#8221; max_width_tablet=&#8221;10%&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_cta title=&#8221;Check the compliance of your information system&#8221; button_url=&#8221;#&#8221; admin_label=&#8221;Service&#8221; _builder_version=&#8221;4.9.4&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Poppins|500|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#321FDB&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_color=&#8221;#3C4B64&#8243; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; use_background_color=&#8221;off&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#8b20bb&#8221; button_bg_color=&#8221;rgba(0,0,0,0)&#8221; button_border_width=&#8221;0px&#8221; button_letter_spacing=&#8221;2px&#8221; button_font=&#8221;Poppins|600||on|||||&#8221; button_icon=&#8221;%%3%%&#8221; button_alignment=&#8221;left&#8221; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;15px||0px||false|false&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;]<\/p>\n<p>Cyberwatch checks your assets against cybersecurity best practices, based on international standards that you can customize, and helps you build a valid in-depth defense.<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Produits&#8221; _builder_version=&#8221;4.9.4&#8243; background_color=&#8221;#ffffff&#8221; custom_padding=&#8221;40px||40px||true|&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px||30px||true|false&#8221; background_color_phone=&#8221;#ffffff&#8221; background_last_edited=&#8221;on|phone&#8221; background_enable_color_phone=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Right Sided Image&#8221; _builder_version=&#8221;4.9.4&#8243; custom_padding=&#8221;0px|0px|40px|0px|false|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;0px||0px||true|false&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch_vulnerability_manager_dashboard.png&#8221; alt=&#8221;Cyberwatch Vulnerability Manager is a vulnerability management platform with Assets mapping, Vulnerability scanning, Prioritization based on technical risk and business requirements, Decision-making tools, and an embedded Patch Management module.&#8221; title_text=&#8221;Cyberwatch Vulnerability Manager Dashboard&#8221; disabled_on=&#8221;on|off|on&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins|||on|||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.7em&#8221; header_2_font=&#8221;Poppins|600||on|||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;16px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_font=&#8221;||||||||&#8221; header_3_text_align=&#8221;left&#8221; header_3_font_size=&#8221;27px&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;700px&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||0px|||&#8221; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#3C4B64&#8243; text_text_color_last_edited=&#8221;on|phone&#8221; header_text_color_tablet=&#8221;&#8221; header_text_color_phone=&#8221;#000000&#8243; header_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_align_tablet=&#8221;&#8221; header_2_text_align_phone=&#8221;center&#8221; header_2_text_align_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;14px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_3_text_align_tablet=&#8221;&#8221; header_3_text_align_phone=&#8221;center&#8221; header_3_text_align_last_edited=&#8221;on|desktop&#8221; header_3_text_color_tablet=&#8221;&#8221; header_3_text_color_phone=&#8221;#000000&#8243; header_3_text_color_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;&#8221; header_3_font_size_phone=&#8221;20px&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h2>Cyberwatch Vulnerability Manager<\/h2>\n<h3>Monitor your vulnerabilities<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins|||on|||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.7em&#8221; header_2_font=&#8221;Poppins|600||on|||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;16px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_font=&#8221;||||||||&#8221; header_3_font_size=&#8221;27px&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#3C4B64&#8243; text_text_color_last_edited=&#8221;on|phone&#8221; header_text_color_tablet=&#8221;&#8221; header_text_color_phone=&#8221;#000000&#8243; header_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; header_3_text_color_tablet=&#8221;&#8221; header_3_text_color_phone=&#8221;#000000&#8243; header_3_text_color_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221;]<\/p>\n<p>Cyberwatch Vulnerability Manager is a vulnerability management platform with Assets mapping, Vulnerability scanning, Prioritization based on technical risk and business requirements, Decision-making tools, and an embedded Patch Management module.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijk4In19@&#8221; button_text=&#8221;Discover Vulnerability Manager&#8221; button_alignment=&#8221;left&#8221; button_alignment_tablet=&#8221;&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#321FDB&#8221; button_bg_color=&#8221;RGBA(0,0,0,0)&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#321FDB&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Poppins||||||||&#8221; button_icon=&#8221;%%3%%&#8221; button_icon_color=&#8221;#321FDB&#8221; button_on_hover=&#8221;off&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px||10px||false|false&#8221; global_module=&#8221;2135&#8243; saved_tabs=&#8221;all&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#321FDB&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_text_color__hover_enabled=&#8221;on|hover&#8221; button_text_color__hover=&#8221;#ffffff&#8221; button_icon_color__hover_enabled=&#8221;on|hover&#8221; button_icon_color__hover=&#8221;#ffffff&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch_vulnerability_manager_dashboard.png&#8221; alt=&#8221;Cyberwatch Vulnerability Manager is a vulnerability management platform with Assets mapping, Vulnerability scanning, Prioritization based on technical risk and business requirements, Decision-making tools, and an embedded Patch Management module.&#8221; title_text=&#8221;Cyberwatch Vulnerability Manager Dashboard&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Left Sided Image&#8221; _builder_version=&#8221;4.9.4&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_padding=&#8221;0px|0px|0px|0px|false|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;0px|0px|0px|0px|false|false&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch_compliance_manager_dashboard.png&#8221; alt=&#8221;Cyberwatch Compliance Manager is a compliance management platform, with hardening level assessment and complete customization of available rules and repositories. &#8221; title_text=&#8221;Cyberwatch Compliance Manager Dashboard&#8221; disabled_on=&#8221;on|off|off&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins|||on|||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.7em&#8221; header_2_font=&#8221;Poppins|600||on|||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;16px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_font=&#8221;||||||||&#8221; header_3_font_size=&#8221;27px&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||-1px|||&#8221; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#ffffff&#8221; text_text_color_last_edited=&#8221;on|phone&#8221; header_text_align_tablet=&#8221;&#8221; header_text_align_phone=&#8221;&#8221; header_text_align_last_edited=&#8221;on|phone&#8221; header_2_text_align_tablet=&#8221;&#8221; header_2_text_align_phone=&#8221;center&#8221; header_2_text_align_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; header_3_text_align_tablet=&#8221;&#8221; header_3_text_align_phone=&#8221;center&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;&#8221; header_3_font_size_phone=&#8221;20px&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h2>Cyberwatch Compliance Manager<\/h2>\n<h3>Check your compliance<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins|||on|||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.7em&#8221; header_2_font=&#8221;Poppins|600||on|||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;16px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_font=&#8221;||||||||&#8221; header_3_font_size=&#8221;27px&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;-1px|||||&#8221; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#3C4B64&#8243; text_text_color_last_edited=&#8221;on|phone&#8221; header_text_color_tablet=&#8221;&#8221; header_text_color_phone=&#8221;#000000&#8243; header_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; header_3_text_color_tablet=&#8221;&#8221; header_3_text_color_phone=&#8221;#000000&#8243; header_3_text_color_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221;]<\/p>\n<p>Cyberwatch Compliance Manager is a compliance management platform, with hardening level assessment and complete customization of available rules and repositories. <\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MCJ9fQ==@&#8221; button_text=&#8221;Discover Compliance Manager&#8221; button_alignment=&#8221;left&#8221; button_alignment_tablet=&#8221;&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#321FDB&#8221; button_bg_color=&#8221;RGBA(0,0,0,0)&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#321FDB&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Poppins||||||||&#8221; button_icon=&#8221;%%3%%&#8221; button_icon_color=&#8221;#321FDB&#8221; button_on_hover=&#8221;off&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px||10px||false|false&#8221; global_module=&#8221;2136&#8243; saved_tabs=&#8221;all&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#321FDB&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_text_color__hover_enabled=&#8221;on|hover&#8221; button_text_color__hover=&#8221;#ffffff&#8221; button_icon_color__hover_enabled=&#8221;on|hover&#8221; button_icon_color__hover=&#8221;#ffffff&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.9.4&#8243; background_color=&#8221;#321FDB&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#000000&#8243; background_color_gradient_end=&#8221;#3c4b64&#8243; background_color_gradient_direction=&#8221;1deg&#8221; background_color_gradient_end_position=&#8221;0%&#8221; background_image=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/coding-background-texture.jpg&#8221; background_blend=&#8221;overlay&#8221; custom_padding=&#8221;40px|0px|40px|0px|true|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px||30px||true|false&#8221;][et_pb_row column_structure=&#8221;1_4,3_4&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Right Sided Image&#8221; _builder_version=&#8221;4.9.4&#8243; custom_margin=&#8221;|auto||auto|false|false&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;0px|0px|30px|0px|false|false&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/turn.png&#8221; alt=&#8221;The Cyberwatch platform allows you to scan your assets in both agent-based and agentless modes.&#8221; title_text=&#8221;Flexible agent-based or agentless scanning options&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;left&#8221; align_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.4&#8243; max_width=&#8221;40%&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;55px&#8221; max_width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; filter_invert=&#8221;100%&#8221; animation_direction=&#8221;right&#8221; hover_enabled=&#8221;0&#8243; module_alignment_tablet=&#8221;&#8221; module_alignment_phone=&#8221;&#8221; module_alignment_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243; disabled_on=&#8221;off|on|off&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins|||on|||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.7em&#8221; header_2_font=&#8221;Poppins|500|||||||&#8221; header_2_text_color=&#8221;#ffffff&#8221; header_2_font_size=&#8221;27px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_font=&#8221;||||||||&#8221; header_3_font_size=&#8221;27px&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#ffffff&#8221; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#ffffff&#8221; header_2_text_color_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;22px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;&#8221; header_3_font_size_phone=&#8221;20px&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h2>Flexible agent-based or agentless scanning options&gt;<\/h2>\n<p>Our platform allows you to scan your assets in both agentless and agent-based modes, and also in air-gapped \/ disconnected mode for sensitive environments.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,3_4&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Right Sided Image&#8221; _builder_version=&#8221;4.9.4&#8243; custom_margin=&#8221;|auto|0px|auto|false|false&#8221; custom_padding=&#8221;40px|0px|40px|0px|true|&#8221; custom_padding_tablet=&#8221;30px||30px||true|false&#8221; custom_padding_phone=&#8221;0px|0px|30px|0px|false|false&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/secret-file.png&#8221; alt=&#8221;The Cyberwatch platform can be deployed in the environment of your choice and does not send your results to any third-party. &#8221; title_text=&#8221;Confidential data&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.9.4&#8243; max_width=&#8221;40%&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;60px&#8221; max_width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; filter_invert=&#8221;100%&#8221; animation_direction=&#8221;right&#8221; hover_enabled=&#8221;0&#8243; module_alignment_tablet=&#8221;&#8221; module_alignment_phone=&#8221;center&#8221; module_alignment_last_edited=&#8221;on|phone&#8221; disabled_on=&#8221;off|on|off&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins|||on|||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.7em&#8221; header_2_font=&#8221;Poppins|500|||||||&#8221; header_2_text_color=&#8221;#ffffff&#8221; header_2_font_size=&#8221;27px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_font=&#8221;||||||||&#8221; header_3_font_size=&#8221;27px&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#ffffff&#8221; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#ffffff&#8221; header_2_text_color_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;22px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; module_alignment_tablet=&#8221;&#8221; module_alignment_phone=&#8221;center&#8221; module_alignment_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h2>Confidential data<\/h2>\n<p>Our platform can be deployed in the environment of your choice and does not send your results to any third-party. The security assessments are performed in your information system. The results stay in your information system.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,3_4&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Right Sided Image&#8221; _builder_version=&#8221;4.9.4&#8243; custom_margin=&#8221;|auto||auto|false|false&#8221; custom_padding=&#8221;0px|0px|0px|0px|false|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;0px|0px|0px|0px|false|false&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/eye-2.png&#8221; alt=&#8221;The Cyberwatch platform performs continuous analysis of your assets even when they are not on your network.&#8221; title_text=&#8221;The continuous Cyberwatch analysis offers maximal visibility&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;center&#8221; align_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.4&#8243; max_width=&#8221;40%&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;60px&#8221; max_width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; filter_invert=&#8221;100%&#8221; animation_direction=&#8221;right&#8221; hover_enabled=&#8221;0&#8243; module_alignment_tablet=&#8221;&#8221; module_alignment_phone=&#8221;center&#8221; module_alignment_last_edited=&#8221;on|phone&#8221; disabled_on=&#8221;off|on|off&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins|||on|||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.7em&#8221; header_2_font=&#8221;Poppins|500|||||||&#8221; header_2_text_color=&#8221;#ffffff&#8221; header_2_font_size=&#8221;27px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_font=&#8221;||||||||&#8221; header_3_font_size=&#8221;27px&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#ffffff&#8221; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#ffffff&#8221; header_2_text_color_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;22px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h2>Continuous analysis for maximal visibility<\/h2>\n<p>Our platform performs continuous assessment of your assets even when they are not on your network. New vulnerabilities are automatically associated to your assets based on last available data, so that you can have maximal visibility on the security of your information system.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/Formulaire_Blanc-1.png&#8221; custom_padding=&#8221;40px||40px||true|&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px||30px||true|false&#8221; global_module=&#8221;2139&#8243;][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;1px||1px|||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins|||on|||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.7em&#8221; header_2_font=&#8221;Poppins|500|||||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;27px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_font=&#8221;||||||||&#8221; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#000000&#8243; header_3_font_size=&#8221;27px&#8221; header_3_line_height=&#8221;1.4em&#8221; text_orientation=&#8221;center&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;||||false|false&#8221; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#3C4B64&#8243; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;22px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h2>Do you have a question?<br \/>Do you want to schedule a free demo?<\/h2>\n<p>Contact-us and our experts will get back to you within 24h.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@&#8221; button_text=&#8221;Get a free demo&#8221; button_alignment=&#8221;center&#8221; button_alignment_tablet=&#8221;&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#321fdb&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;RGBA(0,0,0,0)&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Poppins||||||||&#8221; button_icon=&#8221;%%3%%&#8221; button_icon_color=&#8221;#ffffff&#8221; button_on_hover=&#8221;off&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|35px|10px|15px|false|false&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#301abf&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p><div class=\"et_pb_module lwp_divi_breadcrumbs lwp_divi_breadcrumbs_0\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"et_pb_module_inner\">\n\t\t\t\t\t<div class=\"lwp-breadcrumbs\"> <span class=\"before\"><\/span> <span vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\"><span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" href=\"https:\/\/cyberwatch.fr\/en\/\" class=\"home\"><span property=\"name\">Accueil<\/span><\/a><meta property=\"position\" content=\"1\"><\/span> <span class=\"separator et-pb-icon\">5<\/span> <\/span><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>A platform to monitor your vulnerabilities and your compliance, from detection to remediation, agent-based or agentless Our platform helps you to find, prioritize, and fix your vulnerabilities and your compliance.Cyberwatch maps your information system, searches for new assets to scan, and helps you to fight against Shadow ITCyberwatch detects and prioritizes [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6897,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-3261","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Manage your vulnerabilities and your compliance with the Cyberwatch platform<\/title>\n<meta name=\"description\" content=\"The Cyberwatch platform allows you to monitor your vulnerabilities and control your compliance, from detection to remediation\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberwatch.fr\/en\/our-platform\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Manage your vulnerabilities and your compliance with the Cyberwatch platform\" \/>\n<meta property=\"og:description\" content=\"The Cyberwatch platform allows you to monitor your vulnerabilities and control your compliance, from detection to remediation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberwatch.fr\/en\/our-platform\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberwatch\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-28T09:40:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/06\/metas-site.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Manage your vulnerabilities and your compliance with the Cyberwatch platform\" \/>\n<meta name=\"twitter:description\" content=\"The Cyberwatch platform allows you to monitor your vulnerabilities and control your compliance, from detection to remediation\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/06\/metas-site.png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"24 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/our-platform\\\/\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/our-platform\\\/\",\"name\":\"Manage your vulnerabilities and your compliance with the Cyberwatch platform\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/our-platform\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/our-platform\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/meta-cyberwatch.png\",\"datePublished\":\"2021-06-16T15:42:04+00:00\",\"dateModified\":\"2021-07-28T09:40:00+00:00\",\"description\":\"The Cyberwatch platform allows you to monitor your vulnerabilities and control your compliance, from detection to remediation\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/our-platform\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/our-platform\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/our-platform\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/meta-cyberwatch.png\",\"contentUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/meta-cyberwatch.png\",\"width\":1200,\"height\":628,\"caption\":\"Logo cyberwatch\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/our-platform\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our platform\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/\",\"name\":\"Cyberwatch\",\"description\":\"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#organization\",\"name\":\"Cyberwatch\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo_simple_black.png\",\"contentUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo_simple_black.png\",\"width\":1883,\"height\":500,\"caption\":\"Cyberwatch\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Manage your vulnerabilities and your compliance with the Cyberwatch platform","description":"The Cyberwatch platform allows you to monitor your vulnerabilities and control your compliance, from detection to remediation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberwatch.fr\/en\/our-platform\/","og_locale":"en_US","og_type":"article","og_title":"Manage your vulnerabilities and your compliance with the Cyberwatch platform","og_description":"The Cyberwatch platform allows you to monitor your vulnerabilities and control your compliance, from detection to remediation","og_url":"https:\/\/cyberwatch.fr\/en\/our-platform\/","og_site_name":"Cyberwatch","article_modified_time":"2021-07-28T09:40:00+00:00","og_image":[{"url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/06\/metas-site.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_title":"Manage your vulnerabilities and your compliance with the Cyberwatch platform","twitter_description":"The Cyberwatch platform allows you to monitor your vulnerabilities and control your compliance, from detection to remediation","twitter_image":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/06\/metas-site.png","twitter_misc":{"Est. reading time":"24 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberwatch.fr\/en\/our-platform\/","url":"https:\/\/cyberwatch.fr\/en\/our-platform\/","name":"Manage your vulnerabilities and your compliance with the Cyberwatch platform","isPartOf":{"@id":"https:\/\/cyberwatch.fr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberwatch.fr\/en\/our-platform\/#primaryimage"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/our-platform\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png","datePublished":"2021-06-16T15:42:04+00:00","dateModified":"2021-07-28T09:40:00+00:00","description":"The Cyberwatch platform allows you to monitor your vulnerabilities and control your compliance, from detection to remediation","breadcrumb":{"@id":"https:\/\/cyberwatch.fr\/en\/our-platform\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberwatch.fr\/en\/our-platform\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberwatch.fr\/en\/our-platform\/#primaryimage","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png","width":1200,"height":628,"caption":"Logo cyberwatch"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberwatch.fr\/en\/our-platform\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberwatch.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Our platform"}]},{"@type":"WebSite","@id":"https:\/\/cyberwatch.fr\/en\/#website","url":"https:\/\/cyberwatch.fr\/en\/","name":"Cyberwatch","description":"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.","publisher":{"@id":"https:\/\/cyberwatch.fr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberwatch.fr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberwatch.fr\/en\/#organization","name":"Cyberwatch","url":"https:\/\/cyberwatch.fr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","width":1883,"height":500,"caption":"Cyberwatch"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/pages\/3261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/comments?post=3261"}],"version-history":[{"count":20,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/pages\/3261\/revisions"}],"predecessor-version":[{"id":4029,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/pages\/3261\/revisions\/4029"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/media\/6897"}],"wp:attachment":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/media?parent=3261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}