{"id":1286,"date":"2022-02-18T10:58:55","date_gmt":"2022-02-18T09:58:55","guid":{"rendered":"https:\/\/cyber-detect.com\/?page_id=1286"},"modified":"2025-03-25T11:53:54","modified_gmt":"2025-03-25T10:53:54","slug":"gorille","status":"publish","type":"page","link":"https:\/\/cyber-detect.com\/en\/gorille\/","title":{"rendered":"GORILLE SUITE"},"content":{"rendered":"<div class=\"container fullwidth\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-style-dark-background-color-1 is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:80px;width:0px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-center\">Nos solutions\u00a0<span style=\"color:#4ec7f2\" class=\"has-inline-color\"><strong>GORILLE<\/strong><\/span> sont con\u00e7ues pour <strong>r\u00e9v\u00e9ler les malwares<\/strong> dissimul\u00e9s dans vos fichiers ex\u00e9cutables <strong>avant qu&#8217;il ne soit trop tard<\/strong>.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px;width:0px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-style-default has-white-color has-text-color has-background has-link-color wp-elements-c69000a63af3e4059ccb8a150da57fef is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#0f1636\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"62\" height=\"42\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/\/2021\/08\/cloud-computing.svg\" alt=\"\" class=\"wp-image-190\" style=\"width:auto;height:45px\"\/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">GORILLE Server<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-center\">vous prot\u00e8ge des attaques cibl\u00e9es<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"#gorille-server\">D\u00e9couvrir GORILLE Server<\/a><\/div>\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-style-default has-white-color has-text-color has-background has-link-color wp-elements-3309a269037ae37d1a0bcbbd97e49041 is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#0f1636\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"29\" height=\"69\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/\/2021\/08\/boy.svg\" alt=\"\" class=\"wp-image-188\" style=\"width:auto;height:45px\"\/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">GORILLE Expert<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-center\">vous aide \u00e0 r\u00e9pondre aux incidents<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"#gorille-expert\">D\u00e9couvrir GORILLE Expert<\/a><\/div>\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-style-default has-white-color has-text-color has-background has-link-color wp-elements-72431c5437e0accc6babf49e209c097e is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#0f1636\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"69\" height=\"50\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/\/2021\/08\/helicopter.svg\" alt=\"\" class=\"wp-image-192\" style=\"width:auto;height:45px\"\/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">GORILLE Patrol<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-center\">d\u00e9busque les menaces dormantes<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"#gorille-patrol\">D\u00e9couvrir GORILLE Patrol<\/a><\/div>\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:70px;width:0px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">Les innovation technologiques<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container fullwidth fullwidth\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-style-dark-background-color-1 is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<ul class=\"wp-block-list has-white-color has-text-color has-link-color wp-elements-faf8063959efd972632f46e289a03fef\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>explicabilit\u00e9 des r\u00e9sultats<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>caract\u00e9risation et attribution de la menace<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>temps de d\u00e9tection sous la seconde<\/li>\n<\/div><\/div><\/div><\/ul>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-style-dark-background-color-1 is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<ul class=\"wp-block-list has-white-color has-text-color has-link-color wp-elements-900fcd49ce69b121063bfa599eb3aaff\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>r\u00e9sistance aux protections et aux variants<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>d\u00e9tection de nouvelle g\u00e9n\u00e9ration avant d\u00e9tonation<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>int\u00e9gration aux solutions en place via API<\/li>\n<\/div><\/div><\/div><\/ul>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading\">Gorille Server<\/h2>\n<a class=\"anchor\" id=\"gorille-server\"><\/a>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Vous avez un doute sur un fichier ?<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Utilisez Gorille pour :<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<ul class=\"wp-block-list\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>d\u00e9tecter et caract\u00e9riser le malware<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>attribuer une famille \u00e0 chaque malware<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>lancer une analyse SAAS ou on-premise<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>d\u00e9tecter le type de protection utilis\u00e9<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>obtenir un rapport PDF + MITRE AT&amp;CK<\/li>\n<\/div><\/div><\/div><\/ul>\n<\/div><\/div><\/div>\n\n<div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-16-1024x576.png\" alt=\"\" class=\"wp-image-1788\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-16-1024x576.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-16-300x169.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-16-768x432.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-16-1536x864.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-16-2048x1152.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading\">Gorille Expert<\/h2>\n<a class=\"anchor\" id=\"gorille-expert\"><\/a>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Vous avez un doute sur un fichier ?<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Utilisez Gorille pour :<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<ul class=\"wp-block-list\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>identifier la malware et sa famille<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>d\u00e9tecter rapidement avec la version web, ou aller plus loin avec la version expert<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>automatiser la caract\u00e9risation<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>obtenir des pistes pour la rem\u00e9diation<\/li>\n<\/div><\/div><\/div><\/ul>\n<\/div><\/div><\/div>\n\n<div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-13-1024x576.png\" alt=\"\" class=\"wp-image-1784\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-13-1024x576.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-13-300x169.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-13-768x432.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-13-1536x864.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-13-2048x1152.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading\">Gorille Patrol<\/h2>\n<a class=\"anchor\" id=\"gorille-patrol\"><\/a>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Vous suspectez une infiltration dans votre S.I ?<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Utilisez Gorille pour :<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<ul class=\"wp-block-list\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>lancer des campagnes d&#8217;analyses<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>d\u00e9tecter les malwares avant d\u00e9tonation<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>identifier le malware et sa famille<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>renforcer votre EDR existant<\/li>\n<\/div><\/div><\/div><\/ul>\n<\/div><\/div><\/div>\n\n<div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-17-1024x576.png\" alt=\"\" class=\"wp-image-1794\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-17-1024x576.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-17-300x169.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-17-768x432.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-17-1536x864.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-17-2048x1152.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><div class=\"container fullwidth\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-style-dark-background-color-1 is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">LES M\u00c9TRIQUES<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"list-icons block-list-icons\" id=\"list-icons-block_fa5e6ab7cc500b831f38e71d9e1b2529\">\n\n    \n                            \n                    <div class=\"wrap-list\">\n                        <img decoding=\"async\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/02\/picto1-1.png\" alt=\"Ic\u00f4ne\" \/>\n\n                        <p class=\"description-list\">D\u00e9tection de variants avant 90 % des antivirus du march\u00e9<\/p>\n                    <\/div>\n\n                            \n        \n                            \n                    <div class=\"wrap-list\">\n                        <img decoding=\"async\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/02\/picto2.png\" alt=\"Ic\u00f4ne\" \/>\n\n                        <p class=\"description-list\">Taux de d\u00e9tection entre 95 et 100%<\/p>\n                    <\/div>\n\n                            \n        \n                            \n                    <div class=\"wrap-list\">\n                        <img decoding=\"async\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/02\/picto3.png\" alt=\"Ic\u00f4ne\" \/>\n\n                        <p class=\"description-list\">Moins de 5 % de faux-positifs<\/p>\n                    <\/div>\n\n                            \n        \n                            \n                    <div class=\"wrap-list\">\n                        <img decoding=\"async\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/02\/picto4.png\" alt=\"Ic\u00f4ne\" \/>\n\n                        <p class=\"description-list\">Base de connaissance de plusieurs millions de malwares<\/p>\n                    <\/div>\n\n                            \n        \n<\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Nos solutions\u00a0GORILLE sont con\u00e7ues pour r\u00e9v\u00e9ler les malwares dissimul\u00e9s dans vos fichiers ex\u00e9cutables avant qu&#8217;il ne soit trop tard. GORILLE Server vous prot\u00e8ge des attaques cibl\u00e9es GORILLE Expert vous aide \u00e0 r\u00e9pondre aux incidents GORILLE Patrol d\u00e9busque les menaces dormantes Les innovation technologiques Gorille Server Vous avez un doute sur un fichier ? Utilisez Gorille [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1286","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>GORILLE SUITE - Cyber-Detect<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyber-detect.com\/en\/gorille\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GORILLE SUITE - Cyber-Detect\" \/>\n<meta property=\"og:description\" content=\"Nos solutions\u00a0GORILLE sont con\u00e7ues pour r\u00e9v\u00e9ler les malwares dissimul\u00e9s dans vos fichiers ex\u00e9cutables avant qu&#8217;il ne soit trop tard. GORILLE Server vous prot\u00e8ge des attaques cibl\u00e9es GORILLE Expert vous aide \u00e0 r\u00e9pondre aux incidents GORILLE Patrol d\u00e9busque les menaces dormantes Les innovation technologiques Gorille Server Vous avez un doute sur un fichier ? Utilisez Gorille [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyber-detect.com\/en\/gorille\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber-Detect\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-25T10:53:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/cloud-computing.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyber-detect.com\/en\/gorille\/\",\"url\":\"https:\/\/cyber-detect.com\/en\/gorille\/\",\"name\":\"GORILLE SUITE - Cyber-Detect\",\"isPartOf\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/gorille\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/gorille\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/\/2021\/08\/cloud-computing.svg\",\"datePublished\":\"2022-02-18T09:58:55+00:00\",\"dateModified\":\"2025-03-25T10:53:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/gorille\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyber-detect.com\/en\/gorille\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/gorille\/#primaryimage\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/\/2021\/08\/cloud-computing.svg\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/\/2021\/08\/cloud-computing.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyber-detect.com\/en\/gorille\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyber-detect.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GORILLE SUITE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"name\":\"Cyber-Detect\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyber-detect.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\",\"name\":\"Cyber-Detect\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"width\":728,\"height\":242,\"caption\":\"Cyber-Detect\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GORILLE SUITE - Cyber-Detect","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyber-detect.com\/en\/gorille\/","og_locale":"en_US","og_type":"article","og_title":"GORILLE SUITE - Cyber-Detect","og_description":"Nos solutions\u00a0GORILLE sont con\u00e7ues pour r\u00e9v\u00e9ler les malwares dissimul\u00e9s dans vos fichiers ex\u00e9cutables avant qu&#8217;il ne soit trop tard. GORILLE Server vous prot\u00e8ge des attaques cibl\u00e9es GORILLE Expert vous aide \u00e0 r\u00e9pondre aux incidents GORILLE Patrol d\u00e9busque les menaces dormantes Les innovation technologiques Gorille Server Vous avez un doute sur un fichier ? Utilisez Gorille [&hellip;]","og_url":"https:\/\/cyber-detect.com\/en\/gorille\/","og_site_name":"Cyber-Detect","article_modified_time":"2025-03-25T10:53:54+00:00","og_image":[{"url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/cloud-computing.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyber-detect.com\/en\/gorille\/","url":"https:\/\/cyber-detect.com\/en\/gorille\/","name":"GORILLE SUITE - Cyber-Detect","isPartOf":{"@id":"https:\/\/cyber-detect.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyber-detect.com\/en\/gorille\/#primaryimage"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/gorille\/#primaryimage"},"thumbnailUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/\/2021\/08\/cloud-computing.svg","datePublished":"2022-02-18T09:58:55+00:00","dateModified":"2025-03-25T10:53:54+00:00","breadcrumb":{"@id":"https:\/\/cyber-detect.com\/en\/gorille\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyber-detect.com\/en\/gorille\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/gorille\/#primaryimage","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/\/2021\/08\/cloud-computing.svg","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/\/2021\/08\/cloud-computing.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/cyber-detect.com\/en\/gorille\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyber-detect.com\/en\/"},{"@type":"ListItem","position":2,"name":"GORILLE SUITE"}]},{"@type":"WebSite","@id":"https:\/\/cyber-detect.com\/en\/#website","url":"https:\/\/cyber-detect.com\/en\/","name":"Cyber-Detect","description":"","publisher":{"@id":"https:\/\/cyber-detect.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyber-detect.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyber-detect.com\/en\/#organization","name":"Cyber-Detect","url":"https:\/\/cyber-detect.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","width":728,"height":242,"caption":"Cyber-Detect"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages\/1286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/comments?post=1286"}],"version-history":[{"count":10,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages\/1286\/revisions"}],"predecessor-version":[{"id":2113,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages\/1286\/revisions\/2113"}],"wp:attachment":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/media?parent=1286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}