{"id":3569,"date":"2018-05-09T08:43:11","date_gmt":"2018-05-09T06:43:11","guid":{"rendered":"https:\/\/www.organisator.ch\/?p=3569"},"modified":"2018-05-09T08:43:11","modified_gmt":"2018-05-09T06:43:11","slug":"die-wahrheit-ueber-nextgen-security","status":"publish","type":"post","link":"https:\/\/www.organisator.ch\/fr\/management\/it\/2018-05-09\/die-wahrheit-ueber-nextgen-security\/","title":{"rendered":"La v\u00e9rit\u00e9 sur la \"NextGen Security"},"content":{"rendered":"<figure id=\"attachment_3571\" aria-describedby=\"caption-attachment-3571\" style=\"width: 640px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3571\" src=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/05\/Die-Wahrheit-ueber-NextGen-Security_Organisator.jpg\" alt=\"\" width=\"640\" height=\"447\" srcset=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/05\/Die-Wahrheit-ueber-NextGen-Security_Organisator.jpg 640w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/05\/Die-Wahrheit-ueber-NextGen-Security_Organisator-16x12.jpg 16w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/05\/Die-Wahrheit-ueber-NextGen-Security_Organisator-251x175.jpg 251w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/05\/Die-Wahrheit-ueber-NextGen-Security_Organisator-501x350.jpg 501w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/05\/Die-Wahrheit-ueber-NextGen-Security_Organisator-300x210.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-3571\" class=\"wp-caption-text\">Sous le terme NextGen Security, de nombreuses demi-v\u00e9rit\u00e9s sont v\u00e9hicul\u00e9es. Les fournisseurs \u00e9tablis de solutions de s\u00e9curit\u00e9 informatique se d\u00e9fendent. (Image : Shutterstock)<\/figcaption><\/figure>\n<p>Les technologies telles que l'IA (intelligence artificielle) et le Machine Learning (ML) se r\u00e9pandent actuellement \u00e0 grande vitesse et font \u00e9galement leur entr\u00e9e dans les produits de s\u00e9curit\u00e9 informatique. En particulier, les nouveaux acteurs, appel\u00e9s fournisseurs NextGen (NGs), qui misent exclusivement sur l'IA et le ML pour la d\u00e9tection, orientent leurs strat\u00e9gies marketing contre les fabricants \u00e9tablis. Cela provoque l'inqui\u00e9tude des responsables de la s\u00e9curit\u00e9 et des utilisateurs qui sont d\u00e9j\u00e0 tr\u00e8s satisfaits depuis de nombreuses ann\u00e9es du niveau de protection offert par les solutions des fournisseurs exp\u00e9riment\u00e9s.<\/p>\n<h2>Critique de la \"NextGen Security<\/h2>\n<p>Il semble donc n\u00e9cessaire d'expliquer objectivement les diff\u00e9rences entre NextGen et les produits de s\u00e9curit\u00e9 \"traditionnels\" - et d'en finir avec les demi-v\u00e9rit\u00e9s des strat\u00e8ges en marketing. \"Avec la d\u00e9signation NextGen qu'ils ont eux-m\u00eames choisie, les nouveaux fabricants veulent en premier lieu se d\u00e9marquer des fournisseurs \u00e9tablis\", explique \u00e0 ce sujet Thomas Uhlemann, expert en s\u00e9curit\u00e9 chez ESET. Cette entreprise europ\u00e9enne, dont le si\u00e8ge est \u00e0 Bratislava, est un de ces fabricants \"\u00e9tablis\" de logiciels de s\u00e9curit\u00e9. Uhlemann se d\u00e9fend donc de mani\u00e8re offensive contre les fournisseurs de nouvelle g\u00e9n\u00e9ration. \"La critique d'une approche pr\u00e9tendument purement r\u00e9active, par exemple via des bases de donn\u00e9es de signatures, est au c\u0153ur de cette d\u00e9marche\", poursuit l'expert. \" Alors que les nouveaux venus sur le march\u00e9 sont cens\u00e9s utiliser de nombreuses nouvelles technologies, ils se servent en fait de nombreux m\u00e9canismes et technologies d\u00e9velopp\u00e9s, affin\u00e9s et utilis\u00e9s par les fabricants \u00e9tablis depuis des ann\u00e9es. \"<span style=\"color: #000000;\"><br \/>\n<\/span><\/p>\n<h2>Les (pr\u00e9tendues) derni\u00e8res technologies<\/h2>\n<p>Les technologies cit\u00e9es par les ONG, telles que la liste blanche et l'apprentissage automatique, sont en partie int\u00e9gr\u00e9es depuis des ann\u00e9es dans les solutions de s\u00e9curit\u00e9 de fournisseurs exp\u00e9riment\u00e9s de longue date. Par exemple, depuis 1997 d\u00e9j\u00e0, les connaissances issues de la recherche sur les r\u00e9seaux neuronaux sont int\u00e9gr\u00e9es dans les produits et technologies de protection de fournisseurs comme ESET, et depuis 2002, la reconnaissance comportementale est int\u00e9gr\u00e9e.<\/p>\n<h2>Fausse affirmation : les fabricants \u00e9tablis ne se fient qu'aux signatures<\/h2>\n<p>Aucun fournisseur sur le march\u00e9 de la s\u00e9curit\u00e9 ne s'appuie uniquement sur les signatures. ESET, par exemple, ne mise plus uniquement sur les signatures depuis la fin des ann\u00e9es 90, mais suit une approche de s\u00e9curit\u00e9 multicouche qui combine diff\u00e9rents m\u00e9canismes.<\/p>\n<h2>Les fausses alertes sont in\u00e9vitables, mais pas graves non plus - si !<\/h2>\n<p>Un taux de d\u00e9tection de 100 % doit \u00eatre l'objectif de toute solution de s\u00e9curit\u00e9 informatique. Chaque fausse alerte entra\u00eene une charge de travail suppl\u00e9mentaire importante pour l'administrateur informatique. En utilisant une solution bas\u00e9e sur plusieurs technologies interd\u00e9pendantes, le taux de faux positifs peut \u00eatre r\u00e9duit \u00e0 z\u00e9ro, ce qu'ESET, par exemple, a d\u00e9montr\u00e9 \u00e0 plusieurs reprises lors de diff\u00e9rents tests ind\u00e9pendants (comme ceux d'AV-Comparatives).<\/p>\n<h2>L'apprentissage automatique remplace les mises \u00e0 jour - pas du tout<\/h2>\n<p>Les ON argumentent que les mises \u00e0 jour des bases de donn\u00e9es de signatures des fournisseurs \u00e9tablis sont d\u00e9mod\u00e9es et que les corrections de vuln\u00e9rabilit\u00e9s semestrielles des logiciels d'auto-apprentissage sont suffisantes. Cependant, une base de donn\u00e9es qui n'apprend que de ses utilisateurs et de son propre r\u00e9seau, sans recevoir de donn\u00e9es de comparaison externes, commettra in\u00e9vitablement des erreurs t\u00f4t ou tard. Des mises \u00e0 jour r\u00e9guli\u00e8res sont imp\u00e9ratives pour int\u00e9grer en permanence des connaissances sur les menaces et \u00e9viter ainsi les non-d\u00e9tections et les fausses alertes.<\/p>\n<h2>Le sandboxing (bo\u00eete \u00e0 sable) : Plus intelligent que les algorithmes<\/h2>\n<p>Les ON pr\u00e9tendent que le sandboxing est une technologie d\u00e9pass\u00e9e, rendue obsol\u00e8te par les algorithmes. Mais il est vrai que les connaissances acquises gr\u00e2ce au sandboxing sont importantes pour en savoir plus sur les menaces et pour optimiser toujours plus la d\u00e9tection. Car l'IA est encore loin d'\u00eatre sup\u00e9rieure \u00e0 l'intelligence humaine. Le code malveillant est crypt\u00e9 et dissimul\u00e9 de mani\u00e8re de plus en plus sophistiqu\u00e9e. Si l'on ne regarde pas derri\u00e8re la fa\u00e7ade, on ne pourra pas le comprendre ni mettre en place des d\u00e9fenses contre lui.<\/p>\n<p><em>Source et informations compl\u00e9mentaires : <a href=\"https:\/\/www.welivesecurity.com\/deutsch\/2017\/04\/12\/kampf-um-wahrheit-cyber-security-next-gen\/\">ESET<\/a><\/em><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Rasant verbreiten sich derzeit Technologien wie KI (K\u00fcnstliche Intelligenz) sowie Machine Learning (ML) und halten dabei auch Einzug in IT-Security-Produkte. Insbesondere neue Player, so genannte NextGen-Anbieter (NGs), die f\u00fcr die Erkennung ausschlie\u00dflich auf KI und ML setzen, richten ihre Marketingstrategien gegen etablierte Hersteller. Diese f\u00fchrt zur Verunsicherung von Sicherheitsverantwortlichen und Anwendern, die bereits seit vielen [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3571,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"NextGen Security","_yoast_wpseo_metadesc":"Eine Reihe von neuen Anbietern von IT-Security-L\u00f6sungen setzen auf \"NextGen Security\" und wollen mit KI (K\u00fcnstliche Intelligenz) und Machine Learning die Nutzer \u00fcberzeugen. Dahinter steckt oft genug reines Marketing.","articlekey":"","footnotes":""},"categories":[27],"tags":[142,260,286],"class_list":["post-3569","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it","tag-cyber-crime","tag-ict-sicherheit","tag-it"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Die Wahrheit \u00fcber \u201eNextGen Security\u201c - Organisator<\/title>\n<meta name=\"description\" content=\"Eine Reihe von neuen Anbietern von IT-Security-L\u00f6sungen setzen auf &quot;NextGen Security&quot; und wollen mit KI (K\u00fcnstliche Intelligenz) und Machine Learning die Nutzer \u00fcberzeugen. Dahinter steckt oft genug reines Marketing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.organisator.ch\/fr\/gestion-2\/it\/2018-05-09\/die-wahrheit-ueber-nextgen-security\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Die Wahrheit \u00fcber \u201eNextGen Security\u201c\" \/>\n<meta property=\"og:description\" content=\"Eine Reihe von neuen Anbietern von #IT-Security-L\u00f6sungen setzen auf &quot;#NextGen Security&quot; und wollen mit #KI (K\u00fcnstliche Intelligenz) und Machine Learning die Nutzer \u00fcberzeugen. Dahinter steckt oft genug reines Marketing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.organisator.ch\/fr\/gestion-2\/it\/2018-05-09\/die-wahrheit-ueber-nextgen-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Organisator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OrganisatorFachmagazin\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-09T06:43:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/05\/Die-Wahrheit-ueber-NextGen-Security_Organisator.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"447\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"thomas.berner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Die Wahrheit \u00fcber \u201e#NextGen #Security\u201c\" \/>\n<meta name=\"twitter:description\" content=\"Eine Reihe von neuen Anbietern von #IT-Security-L\u00f6sungen setzen auf &quot;#NextGen Security&quot; und wollen mit #KI (K\u00fcnstliche Intelligenz) und Machine Learning die Nutzer \u00fcberzeugen. Dahinter steckt oft genug reines Marketing.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/05\/Die-Wahrheit-\u00fcber-NextGen-Security_Organisator.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-05-09\\\/die-wahrheit-ueber-nextgen-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-05-09\\\/die-wahrheit-ueber-nextgen-security\\\/\"},\"author\":{\"name\":\"thomas.berner\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/6f650f90b2842cd4c0cc334b4e36f67e\"},\"headline\":\"Die Wahrheit \u00fcber \u201eNextGen Security\u201c\",\"datePublished\":\"2018-05-09T06:43:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-05-09\\\/die-wahrheit-ueber-nextgen-security\\\/\"},\"wordCount\":560,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-05-09\\\/die-wahrheit-ueber-nextgen-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/Die-Wahrheit-ueber-NextGen-Security_Organisator.jpg\",\"keywords\":[\"Cyber-Crime\",\"ICT-Sicherheit\",\"IT\"],\"articleSection\":[\"IT\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-05-09\\\/die-wahrheit-ueber-nextgen-security\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-05-09\\\/die-wahrheit-ueber-nextgen-security\\\/\",\"name\":\"Die Wahrheit \u00fcber \u201eNextGen Security\u201c - Organisator\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-05-09\\\/die-wahrheit-ueber-nextgen-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-05-09\\\/die-wahrheit-ueber-nextgen-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/Die-Wahrheit-ueber-NextGen-Security_Organisator.jpg\",\"datePublished\":\"2018-05-09T06:43:11+00:00\",\"description\":\"Eine Reihe von neuen Anbietern von IT-Security-L\u00f6sungen setzen auf \\\"NextGen Security\\\" und wollen mit KI (K\u00fcnstliche Intelligenz) und Machine Learning die Nutzer \u00fcberzeugen. Dahinter steckt oft genug reines Marketing.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-05-09\\\/die-wahrheit-ueber-nextgen-security\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-05-09\\\/die-wahrheit-ueber-nextgen-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-05-09\\\/die-wahrheit-ueber-nextgen-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/Die-Wahrheit-ueber-NextGen-Security_Organisator.jpg\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/Die-Wahrheit-ueber-NextGen-Security_Organisator.jpg\",\"width\":640,\"height\":447,\"caption\":\"Unter dem Begriff NextGen Security werden viele Halbwahrheiten vermittelt. Etablierte Anbieter von IT-Security-L\u00f6sungen wehren sich. (Bild: Shutterstock)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-05-09\\\/die-wahrheit-ueber-nextgen-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.organisator.ch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Die Wahrheit \u00fcber \u201eNextGen Security\u201c\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"name\":\"Organisator\",\"description\":\"Kompetent. Praxisnah. Der ORGANISATOR bereitet in 10 Ausgaben pro Jahr die wesentlichen Themen f\u00fcr F\u00fchrungskr\u00e4fte von KMU auf.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.organisator.ch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\",\"name\":\"Organisator\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"width\":800,\"height\":77,\"caption\":\"Organisator\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/OrganisatorFachmagazin\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/organisator-das-magazin-fr-kmu\",\"https:\\\/\\\/www.xing.com\\\/news\\\/pages\\\/organisator-ch-695\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGP2Sq0iWaZwT3BdIAQFYpw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/6f650f90b2842cd4c0cc334b4e36f67e\",\"name\":\"thomas.berner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"caption\":\"thomas.berner\"},\"url\":\"https:\\\/\\\/www.organisator.ch\\\/fr\\\/author\\\/thomas-berner\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La v\u00e9rit\u00e9 sur \"NextGen Security\" - Organisateur","description":"Un certain nombre de nouveaux fournisseurs de solutions de s\u00e9curit\u00e9 informatique misent sur la \"NextGen Security\" et veulent convaincre les utilisateurs avec l'IA (intelligence artificielle) et l'apprentissage automatique. Derri\u00e8re cela se cache assez souvent du marketing pur.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.organisator.ch\/fr\/gestion-2\/it\/2018-05-09\/die-wahrheit-ueber-nextgen-security\/","og_locale":"fr_FR","og_type":"article","og_title":"Die Wahrheit \u00fcber \u201eNextGen Security\u201c","og_description":"Eine Reihe von neuen Anbietern von #IT-Security-L\u00f6sungen setzen auf \"#NextGen Security\" und wollen mit #KI (K\u00fcnstliche Intelligenz) und Machine Learning die Nutzer \u00fcberzeugen. Dahinter steckt oft genug reines Marketing.","og_url":"https:\/\/www.organisator.ch\/fr\/gestion-2\/it\/2018-05-09\/die-wahrheit-ueber-nextgen-security\/","og_site_name":"Organisator","article_publisher":"https:\/\/www.facebook.com\/OrganisatorFachmagazin","article_published_time":"2018-05-09T06:43:11+00:00","og_image":[{"width":640,"height":447,"url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/05\/Die-Wahrheit-ueber-NextGen-Security_Organisator.jpg","type":"image\/jpeg"}],"author":"thomas.berner","twitter_card":"summary_large_image","twitter_title":"Die Wahrheit \u00fcber \u201e#NextGen #Security\u201c","twitter_description":"Eine Reihe von neuen Anbietern von #IT-Security-L\u00f6sungen setzen auf \"#NextGen Security\" und wollen mit #KI (K\u00fcnstliche Intelligenz) und Machine Learning die Nutzer \u00fcberzeugen. Dahinter steckt oft genug reines Marketing.","twitter_image":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/05\/Die-Wahrheit-\u00fcber-NextGen-Security_Organisator.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.organisator.ch\/management\/it\/2018-05-09\/die-wahrheit-ueber-nextgen-security\/#article","isPartOf":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2018-05-09\/die-wahrheit-ueber-nextgen-security\/"},"author":{"name":"thomas.berner","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/6f650f90b2842cd4c0cc334b4e36f67e"},"headline":"Die Wahrheit \u00fcber \u201eNextGen Security\u201c","datePublished":"2018-05-09T06:43:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2018-05-09\/die-wahrheit-ueber-nextgen-security\/"},"wordCount":560,"commentCount":0,"publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2018-05-09\/die-wahrheit-ueber-nextgen-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/05\/Die-Wahrheit-ueber-NextGen-Security_Organisator.jpg","keywords":["Cyber-Crime","ICT-Sicherheit","IT"],"articleSection":["IT"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.organisator.ch\/management\/it\/2018-05-09\/die-wahrheit-ueber-nextgen-security\/","url":"https:\/\/www.organisator.ch\/management\/it\/2018-05-09\/die-wahrheit-ueber-nextgen-security\/","name":"La v\u00e9rit\u00e9 sur \"NextGen Security\" - Organisateur","isPartOf":{"@id":"https:\/\/www.organisator.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2018-05-09\/die-wahrheit-ueber-nextgen-security\/#primaryimage"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2018-05-09\/die-wahrheit-ueber-nextgen-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/05\/Die-Wahrheit-ueber-NextGen-Security_Organisator.jpg","datePublished":"2018-05-09T06:43:11+00:00","description":"Un certain nombre de nouveaux fournisseurs de solutions de s\u00e9curit\u00e9 informatique misent sur la \"NextGen Security\" et veulent convaincre les utilisateurs avec l'IA (intelligence artificielle) et l'apprentissage automatique. Derri\u00e8re cela se cache assez souvent du marketing pur.","breadcrumb":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2018-05-09\/die-wahrheit-ueber-nextgen-security\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.organisator.ch\/management\/it\/2018-05-09\/die-wahrheit-ueber-nextgen-security\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.organisator.ch\/management\/it\/2018-05-09\/die-wahrheit-ueber-nextgen-security\/#primaryimage","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/05\/Die-Wahrheit-ueber-NextGen-Security_Organisator.jpg","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/05\/Die-Wahrheit-ueber-NextGen-Security_Organisator.jpg","width":640,"height":447,"caption":"Unter dem Begriff NextGen Security werden viele Halbwahrheiten vermittelt. Etablierte Anbieter von IT-Security-L\u00f6sungen wehren sich. (Bild: Shutterstock)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.organisator.ch\/management\/it\/2018-05-09\/die-wahrheit-ueber-nextgen-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.organisator.ch\/"},{"@type":"ListItem","position":2,"name":"Die Wahrheit \u00fcber \u201eNextGen Security\u201c"}]},{"@type":"WebSite","@id":"https:\/\/www.organisator.ch\/#website","url":"https:\/\/www.organisator.ch\/","name":"Organisateur","description":"Comp\u00e9tence et comp\u00e9tence. Proches de la pratique. L'ORGANISATEUR pr\u00e9pare 10 num\u00e9ros par an sur les th\u00e8mes essentiels pour les dirigeants de PME.","publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.organisator.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.organisator.ch\/#organization","name":"Organisateur","url":"https:\/\/www.organisator.ch\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","width":800,"height":77,"caption":"Organisator"},"image":{"@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OrganisatorFachmagazin","https:\/\/www.linkedin.com\/showcase\/organisator-das-magazin-fr-kmu","https:\/\/www.xing.com\/news\/pages\/organisator-ch-695","https:\/\/www.youtube.com\/channel\/UCGP2Sq0iWaZwT3BdIAQFYpw"]},{"@type":"Person","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/6f650f90b2842cd4c0cc334b4e36f67e","name":"thomas.berner","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","caption":"thomas.berner"},"url":"https:\/\/www.organisator.ch\/fr\/author\/thomas-berner\/"}]}},"_links":{"self":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/posts\/3569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/comments?post=3569"}],"version-history":[{"count":0,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/posts\/3569\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/media\/3571"}],"wp:attachment":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/media?parent=3569"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/categories?post=3569"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/tags?post=3569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}