{"id":12449,"date":"2020-02-14T21:07:13","date_gmt":"2020-02-15T02:07:13","guid":{"rendered":"https:\/\/telium.io\/securite-pour-asterisk\/fonctionnalites\/"},"modified":"2024-04-24T11:58:27","modified_gmt":"2024-04-24T16:58:27","slug":"fonctionnalites","status":"publish","type":"page","link":"https:\/\/telium.io\/fr\/securite-pour-asterisk\/fonctionnalites\/","title":{"rendered":"Fonctionnalit\u00e9s"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility lazyload headerheight\" style=\"--awb-background-position:right center;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-color:#000000;--awb-background-size:cover;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/banner-checkboxes.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-padding-top:125px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% ) * 0.33333333333333 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-image-element in-legacy-container\" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"299\" height=\"225\" title=\"t\u00e9l\u00e9phone-int\u00e9rieur-mur3\" src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/phone-inside-wall3.png\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/phone-inside-wall3.png\" alt class=\"lazyload img-responsive wp-image-11065\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27299%27%20height%3D%27225%27%20viewBox%3D%270%200%20299%20225%27%3E%3Crect%20width%3D%27299%27%20height%3D%27225%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/phone-inside-wall3-200x151.png 200w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/phone-inside-wall3.png 299w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, 299px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-two-third fusion-column-last fusion-animated\" style=\"--awb-padding-top:50px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% ) * 0.66666666666667 ) );\" data-animationType=\"zoomIn\" data-animationDuration=\"0.9\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-no-small-visibility fusion-no-medium-visibility fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-bottom:50px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#ffffff;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.4;\">S\u00e9curit\u00e9 pour Asterisk<\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-six\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;--awb-font-size:18px;\"><h6 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:18;--minFontSize:18;line-height:1.5;\"><pre>Comprehensive protection and defense against PBX hacking and fraud<\/pre><\/h6><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-equal-height-columns fusion-no-medium-visibility fusion-no-large-visibility lazyload\" style=\"--awb-background-position:left top;--awb-border-color:#ff6600;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-size:cover;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/banner-checkboxes.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last mobileheader\" style=\"--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-title title fusion-title-3 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-one mobilebreadcrumb\" style=\"--awb-text-color:#cfcfcf;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.4;\">SECAST<\/h1><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-1\"><p><span style=\"color: #cfcfcf; font-size: 150%;\">\u00bb<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-two mobilebreadcrumb\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.5;\">FONCTIONNALIT\u00c9S<\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"product-tabs\"><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-1 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/fr\/securite-pour-asterisk\/\"><i class=\"fa-book fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Overview<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-2 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/fr\/securite-pour-asterisk\/avantages\/\"><i class=\"fa-life-ring fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Benefits<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-large button-custom fusion-button-default button-3 fusion-button-span-no fusion-has-button-gradient cursor-default product-tab\" style=\"--button_accent_color:#fff;--button_accent_hover_color:#fff;--button_border_hover_color:#787878;--button_gradient_top_color:#ff6600;--button_gradient_bottom_color:#dd4400;--button_gradient_top_color_hover:#ff6600;--button_gradient_bottom_color_hover:#dd4400;--button_text_transform:none;\" target=\"_self\" href=\"#\"><i class=\"fa-check-double fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Features<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-4 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/fr\/securite-pour-asterisk\/technique\/\"><i class=\"fa-microchip fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Technology<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-5 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/fr\/securite-pour-asterisk\/temoignages\/\"><i class=\"fa-bullhorn fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Testimonials<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-6 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/fr\/securite-pour-asterisk\/capture-decran\/\"><i class=\"fa-camera fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Screenshots<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-7 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/fr\/securite-pour-asterisk\/videos\/\"><i class=\"fa-video-camera fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Videos<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-8 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/fr\/securite-pour-asterisk\/editions\/\"><i class=\"fa-check-circle fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Editions<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-9 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/fr\/securite-pour-asterisk\/questions\/\"><i class=\"fa-question-circle fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">FAQ<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-10 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/fr\/securite-pour-asterisk\/comparaison\/\"><i class=\"fa-balance-scale fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Comparison<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-11 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/fr\/securite-pour-asterisk\/telecharger\/\"><i class=\"fa-download fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-12 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/fr\/securite-pour-asterisk\/prix-acheter-2\/\"><i class=\"fa-shopping-cart fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Pricing \/ Buy<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-13 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/fr\/securite-pour-asterisk\/forums\/\"><i class=\"fa-comment fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Forums<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-14 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/fr\/securite-pour-asterisk\/accorder-une-licence-a\/\"><i class=\"fa-gavel fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">License<\/span><\/a><\/div><h2 style=\"color: rgba(0,0,0,0);display: inline;font-size: 0em;\">features<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-16 fusion-content-boxes-1 content-boxes-clean-horizontal content-left content-boxes-icon-on-side\" style=\"--awb-backgroundcolor:#efefef;--awb-hover-accent-color:#ff6600;--awb-circle-hover-accent-color:#ff6600;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-db-phone-numbers.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Base de Donn\u00e9es sur lesNnum\u00e9ros de T\u00e9l\u00e9phone Frauduleux<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst peut v\u00e9rifier chaque num\u00e9ro de t\u00e9l\u00e9phone compos\u00e9 contre une base de donn\u00e9es de num\u00e9ros de t\u00e9l\u00e9phone connus pour \u00eatre impliqu\u00e9s dans la fraude (et le piratage) activit\u00e9s. Les appels soup\u00e7onn\u00e9s d\u2019\u00eatre frauduleux peuvent \u00eatre automatiquement d\u00e9connect\u00e9s et\/ou les p\u00e9riph\u00e9riques d\u2019origine peuvent \u00eatre emp\u00each\u00e9s de se connecter au PBX. SecAst peut \u00e9galement traiter diff\u00e9remment le taux de prime et les num\u00e9ros de co\u00fbts partag\u00e9s, ce qui permet d\u2019\u00e9viter les appels aux exploits de num\u00e9ros de t\u00e9l\u00e9phone frauduleux \u00e0 z\u00e9ro jour. La base de donn\u00e9es sur la fraude de Telium a \u00e9t\u00e9 d\u00e9velopp\u00e9e pendant de nombreuses ann\u00e9es et est l\u2019un des outils de pr\u00e9vention de la fraude les plus importants et les plus complets \u00e0 la disposition des transporteurs et des utilisateurs finaux.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-db-ip-address.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Base de Donn\u00e9es d\u2019Adresse IP Hacker<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst peut v\u00e9rifier l\u2019adresse IP source de chaque appareil \/ agent utilisateur se connectant au PBX contre une base de donn\u00e9es d\u2019adresses IP connues pour \u00eatre utilis\u00e9s dans le piratage (et la fraude) activit\u00e9s. SecAst peut \u00e9galement traiter les adresses imm\u00e9diates (qui peuvent \u00eatre utilis\u00e9es par le m\u00eame pirate) comme suspect et les \u00e9valuer en fonction de leurs voisins. Les appareils soup\u00e7onn\u00e9s d\u2019\u00eatre impliqu\u00e9s dans le piratage peuvent \u00eatre emp\u00each\u00e9s de faire des appels et\/ou bloqu\u00e9s de se connecter au PBX. La base de donn\u00e9es d\u2019adresses IP des pirates de Telium a \u00e9t\u00e9 d\u00e9velopp\u00e9e au fil des ans et est l\u2019un des outils de pr\u00e9vention des intrusions sp\u00e9cifiques PBX les plus importants et les plus complets \u00e0 la disposition des transporteurs et des utilisateurs finaux.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-db-location.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Base de donn\u00e9es d\u2019adresse IP g\u00e9ographique<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst int\u00e8gre une base de donn\u00e9es d\u2019adresses IPv4 et IPv6 de partout dans le monde, y compris le continent \/ pays \/ r\u00e9gion \/ ville de chaque IP. SecAst peut \u00eatre configur\u00e9 pour permettre ou refuser l\u2019acc\u00e8s \u00e0 toute combinaison de ces attributs g\u00e9ographiques (ainsi qu\u2019un comportement par d\u00e9faut &#8220;autoriser \/ refuser&#8221;). Si un attaquant tente d\u2019acc\u00e9der au serveur Asterisk \u00e0 partir d\u2019un emplacement refus\u00e9, l\u2019utilisateur est imm\u00e9diatement d\u00e9connect\u00e9. Cela cr\u00e9e une cl\u00f4ture g\u00e9ographique (ou g\u00e9ofence) qui maintient les bons et les m\u00e9chants.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-4 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-breached-credentials.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">D\u00e9tection d\u2019attaque d\u2019identification viol\u00e9e<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst peut d\u00e9tecter des sch\u00e9mas inhabituels de trafic et d\u2019utilisation indicatifs des informations d\u2019identification qui ont \u00e9t\u00e9 viol\u00e9es (fuite ou en quelque sorte d\u00e9couvert par un attaquant). Cela comprend le suivi du nombre d\u2019appels en cours, la rapidit\u00e9 avec laquelle les appels sont configur\u00e9s, m\u00eame la vitesse \u00e0 laquelle l\u2019utilisateur compose des chiffres. SecAst peut r\u00e9pondre \u00e0 ces activit\u00e9s suspectes en bloquant l\u2019utilisateur au niveau du r\u00e9seau, et en emp\u00eachant tout exploit suppl\u00e9mentaire. Ces blocs peuvent durer des heures, des jours ou ind\u00e9finiment.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-5 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-heuristic-brain.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">D\u00e9tection d\u2019attaque heuristique<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst peut apprendre de nouveaux mod\u00e8les d\u2019attaque et ajuster sa d\u00e9tection et ses d\u00e9fenses en cons\u00e9quence. Le scanner heuristique surveille une VARc\u2019est-\u00e0-dire Asterisk et des sch\u00e9mas de trafic r\u00e9seau pour d\u00e9tecter les activit\u00e9s suspectes, les corr\u00e9ler avec des r\u00e8gles qui indiquent l\u2019activit\u00e9 probable de l\u2019attaquant, puis bloquer l\u2019attaquant au niveau du r\u00e9seau emp\u00eachant toute autre tentative. Ces blocs peuvent durer des heures, des jours ou ind\u00e9finiment.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-6 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-moving-ip.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">D\u00e9tection d\u2019Attaque IP en Mouvement<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst peut d\u00e9tecter les attaques de pirates informatiques qui changent constamment et rapidement les adresses IP. Les pirates professionnels d\u00e9placent maintenant leurs adresses IP \u00e0 travers de larges gammes d\u2019adresses IP \u00e0 partir de nuages, services VPN, grands sous-filets, etc pour \u00e9viter la d\u00e9tection par des outils simplistes comme fail2ban ou pare-feu r\u00e9guliers. SecAst int\u00e8gre une collection diversifi\u00e9e de points de donn\u00e9es pour permettre la d\u00e9tection des pirates d\u00e8s qu\u2019ils se connectent au PBX \u00e0 partir d\u2019une nouvelle adresse IP.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-7 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-brute-force.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">D\u00e9tection d\u2019attaque de force brute<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst peut d\u00e9tecter les attaques de force brute (tentatives d\u2019acc\u00e8s en essayant des combinaisons VARious de noms d\u2019utilisateur \/ mots de passe, extensions couramment utilis\u00e9es, mots de passe couramment utilis\u00e9s, etc.). Contrairement \u00e0 d\u2019autres produits, SecAst peut d\u00e9tecter ces attaques m\u00eame si elle est r\u00e9partie sur de nombreux jours (les attaquants ex\u00e9cutent maintenant des attaques \u00abminces\u00bb pour contourner les programmes de d\u00e9tection simplistes comme fail2ban) et de nombreuses adresses IP. SecAst peut r\u00e9pondre \u00e0 ces attaques en les bloquant au niveau du r\u00e9seau et en emp\u00eachant toute nouvelle tentative. Ces blocs peuvent durer des heures, des jours ou ind\u00e9finiment.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-8 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-dial-pattern.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Protection de remplacement de cadran<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst surveille tous les chiffres en \u00e9tant compos\u00e9 et peut bloquer les tentatives d\u2019appeler des num\u00e9ros restreints ou de composer d\u2019autres mod\u00e8les. Bien que les cadrans remplissent \u00e9galement cette fonction, si un serveur Asterisk est compromis (par exemple: FreePBX\u00ae GUI pirat\u00e9), puis SecAst remplacera le cadran et encore bloquer ou accepter seulement certains num\u00e9ros. La reconnaissance du mod\u00e8le de cadran peut correspondre \u00e0 n\u2019importe quelle cha\u00eene de cadran et autoriser ou bloquer la tentative de cadran bas\u00e9e sur des r\u00e8gles d\u00e9finies par l\u2019administrateur.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-9 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-trunk-endpoints.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Trunk et Endpoint Trust<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst peut \u00eatre charg\u00e9 de faire confiance \u00e0 des troncs, des points de terminaison (utilisateurs ou t\u00e9l\u00e9phones) particuliers et des adresses IP afin qu\u2019ils soient exempt\u00e9s du contr\u00f4le de s\u00e9curit\u00e9. Cela permet aux administrateurs d\u2019accorder aux utilisateurs ou aux appareils particuliers l\u2019acc\u00e8s quel que soit l\u2019emplacement, les volumes d\u2019appels, etc. (ce qui peut \u00eatre n\u00e9cessaire pour les vendeurs itin\u00e9rants, les autodialers, etc.). Cela permet \u00e9galement aux administrateurs de d\u00e9signer certains troncs \/ itin\u00e9raires comme fiables et d\u2019autres comme non fiables.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-10 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-threat-level.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">R\u00e9ponse au niveau de la menace<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst surveille le nombre et le taux d\u2019attaques contre le serveur Asterisk et bas\u00e9 sur les seuils d\u00e9finis par l\u2019administrateur maintient un niveau de menace global auquel est confront\u00e9 le PBX. Les modifications du niveau de menace peuvent d\u00e9clencher des scripts, des notifications et d\u2019autres r\u00e9ponses bas\u00e9es sur le syst\u00e8me. Le niveau de menace s\u2019int\u00e8gre directement au syst\u00e8me de gestionnaire d\u2019\u00e9v\u00e9nements tel que indiqu\u00e9 ci-dessous.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-11 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-external-firewall.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Contr\u00f4le externe des pare-feu<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Bien que SecAst puisse bloquer les pirates directement sur le PBX si n\u00e9cessaire, SecAst peut bloquer les pirates \u00e0 un pare-feu sur le bord du r\u00e9seau. SecAst peut interagir directement avec pratiquement n\u2019importe quel pare-feu externe, lui commandant d\u2019ajouter des r\u00e8gles pour bloquer les adresses IP, supprimer les adresses IP bloqu\u00e9es, etc. en utilisant le syst\u00e8me de gestionnaire d\u2019\u00e9v\u00e9nements d\u00e9crit ci-dessous. (Pour att\u00e9nuer le risque global de piratage, les environnements commerciaux PBX devraient toujours bloquer les attaquants au bord du r\u00e9seau.)<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-12 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2019\/12\/icon-event-handler.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Syst\u00e8me de gestionnaire d\u2019\u00e9v\u00e9nements<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Une caract\u00e9ristique qui rend SecAst \u00e0 la fois flexible et puissant est le syst\u00e8me de gestionnaire d\u2019\u00e9v\u00e9nements, qui permet aux administrateurs crocheter n\u2019importe quel programme \/ script dans les \u00e9v\u00e9nements g\u00e9n\u00e9r\u00e9s par ou d\u00e9tect\u00e9s par SecAst. Par exemple, les \u00e9v\u00e9nements li\u00e9s \u00e0 une attaque permettent aux administrateurs d\u2019automatiser les modifications apport\u00e9es aux pare-feu, aux routeurs, aux points de terminaison SIP, aux r\u00e8gles du plan de cadran, aux extensions accessibles, etc.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-13 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2019\/12\/icon-telnet-interface.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Interface Telnet<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Les administrateurs seront imm\u00e9diatement \u00e0 l\u2019aise avec l\u2019interface simple et puissante telnet \u00e0 SecAst. Toute la s\u00e9curit\u00e9 PBX peut \u00eatre g\u00e9r\u00e9e et contr\u00f4l\u00e9e \u00e0 partir d\u2019une interface telnet, que ce soit \u00e0 partir d\u2019un PC, d\u2019une tablette ou d\u2019un t\u00e9l\u00e9phone cellulaire. L&#8217;interface comprend une aide en ligne et une sortie terminale conviviale et riche.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-14 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2019\/12\/icon-web-interface.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Interface de Navigateur<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Les administrateurs chevronn\u00e9s et les novices seront \u00e0 l\u2019aise avec l\u2019interface simple et puissante du navigateur (web) \u00e0 SecAst. La s\u00e9curit\u00e9 peut \u00eatre surveill\u00e9e \u00e0 partir de n\u2019importe quel navigateur, y compris un PC, une tablette ou un t\u00e9l\u00e9phone cellulaire. L\u2019interface fournit des d\u00e9tails sur les attaques, le niveau de menace, les cartes source d\u2019attaque, et plus encore.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-15 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2019\/12\/icon-socket-interface.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Interfaces Socket, PHP et ReST<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Les d\u00e9veloppeurs appr\u00e9cieront les interfaces de prise, PHP et REST (Representational State Transfer) \u00e0 SecAst, car la puissance et le contr\u00f4le de SecAst peuvent \u00eatre facilement \u00e9largis et int\u00e9gr\u00e9s avec d\u2019autres outils d\u2019administration et de surveillance du syst\u00e8me. Le package de t\u00e9l\u00e9chargement comprend un exemple de code d\u00e9montrant comment extraire des donn\u00e9es et contr\u00f4ler SecAst via un service web, via une classe PHP, et via l\u2019interface de prise.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-16 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2019\/12\/icon-asterisk-versions.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Asterisk Compatibilit\u00e9<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst est compatible avec un large \u00e9ventail de versions et de distributions Asterisk SecAst fonctionne avec les versions Asterisk 1.4 \u00e0 16, \u00e0 la fois 32 bits et 64 bits. SecAst est compatible avec un large \u00e9ventail de distributions de \u00ae Asterisky compris Asterisk, FreePBX\u00ae, PBX In A Flash\u00ae, TrixBox\u00ae, Elastix\u00ae, Issabel\u00ae, xCALLY Motion\u00ae, Thirdlane\u00ae, Genesis ISS\u00ae, et plus encore.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":12317,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"class_list":["post-12449","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fonctionnalit\u00e9s - S\u00e9curit\u00e9 pour Asterisk - Telium<\/title>\n<meta name=\"description\" content=\"Consultez la liste des principales fonctionnalit\u00e9s offertes par Security for Asterisk (SECast). De la d\u00e9tection de la fraude et du piratage au blocage des attaquants au bord du r\u00e9seau.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/telium.io\/fr\/securite-pour-asterisk\/fonctionnalites\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fonctionnalit\u00e9s - S\u00e9curit\u00e9 pour Asterisk - Telium\" \/>\n<meta property=\"og:description\" content=\"Consultez la liste des principales fonctionnalit\u00e9s offertes par Security for Asterisk (SECast). De la d\u00e9tection de la fraude et du piratage au blocage des attaquants au bord du r\u00e9seau.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/telium.io\/fr\/securite-pour-asterisk\/fonctionnalites\/\" \/>\n<meta property=\"og:site_name\" content=\"Telium\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-24T16:58:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@telium_io\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"23 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/telium.io\\\/fr\\\/securite-pour-asterisk\\\/fonctionnalites\\\/\",\"url\":\"https:\\\/\\\/telium.io\\\/fr\\\/securite-pour-asterisk\\\/fonctionnalites\\\/\",\"name\":\"Fonctionnalit\u00e9s - S\u00e9curit\u00e9 pour Asterisk - Telium\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/telium.io\\\/fr\\\/#website\"},\"datePublished\":\"2020-02-15T02:07:13+00:00\",\"dateModified\":\"2024-04-24T16:58:27+00:00\",\"description\":\"Consultez la liste des principales fonctionnalit\u00e9s offertes par Security for Asterisk (SECast). De la d\u00e9tection de la fraude et du piratage au blocage des attaquants au bord du r\u00e9seau.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/telium.io\\\/fr\\\/securite-pour-asterisk\\\/fonctionnalites\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/telium.io\\\/fr\\\/securite-pour-asterisk\\\/fonctionnalites\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/telium.io\\\/fr\\\/securite-pour-asterisk\\\/fonctionnalites\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/telium.io\\\/fr\\\/accueil\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 pour Asterisk\",\"item\":\"https:\\\/\\\/telium.io\\\/fr\\\/securite-pour-asterisk\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fonctionnalit\u00e9s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/telium.io\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/telium.io\\\/fr\\\/\",\"name\":\"Telium\",\"description\":\"T\u00e9l\u00e9phonie et T\u00e9l\u00e9matique\",\"publisher\":{\"@id\":\"https:\\\/\\\/telium.io\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/telium.io\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/telium.io\\\/fr\\\/#organization\",\"name\":\"Telium\",\"url\":\"https:\\\/\\\/telium.io\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/telium.io\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/telium.io\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2020\\\/01\\\/logo_o_800x800.png\",\"contentUrl\":\"https:\\\/\\\/telium.io\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2020\\\/01\\\/logo_o_800x800.png\",\"width\":800,\"height\":800,\"caption\":\"Telium\"},\"image\":{\"@id\":\"https:\\\/\\\/telium.io\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/category\\\/Telecommunication-Company\\\/Telium-1581395458787072\\\/\",\"https:\\\/\\\/x.com\\\/telium_io\",\"https:\\\/\\\/ca.linkedin.com\\\/company\\\/telium\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fonctionnalit\u00e9s - S\u00e9curit\u00e9 pour Asterisk - Telium","description":"Consultez la liste des principales fonctionnalit\u00e9s offertes par Security for Asterisk (SECast). De la d\u00e9tection de la fraude et du piratage au blocage des attaquants au bord du r\u00e9seau.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/telium.io\/fr\/securite-pour-asterisk\/fonctionnalites\/","og_locale":"fr_FR","og_type":"article","og_title":"Fonctionnalit\u00e9s - S\u00e9curit\u00e9 pour Asterisk - Telium","og_description":"Consultez la liste des principales fonctionnalit\u00e9s offertes par Security for Asterisk (SECast). De la d\u00e9tection de la fraude et du piratage au blocage des attaquants au bord du r\u00e9seau.","og_url":"https:\/\/telium.io\/fr\/securite-pour-asterisk\/fonctionnalites\/","og_site_name":"Telium","article_publisher":"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","article_modified_time":"2024-04-24T16:58:27+00:00","twitter_card":"summary_large_image","twitter_site":"@telium_io","twitter_misc":{"Est. reading time":"23 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/telium.io\/fr\/securite-pour-asterisk\/fonctionnalites\/","url":"https:\/\/telium.io\/fr\/securite-pour-asterisk\/fonctionnalites\/","name":"Fonctionnalit\u00e9s - S\u00e9curit\u00e9 pour Asterisk - Telium","isPartOf":{"@id":"https:\/\/telium.io\/fr\/#website"},"datePublished":"2020-02-15T02:07:13+00:00","dateModified":"2024-04-24T16:58:27+00:00","description":"Consultez la liste des principales fonctionnalit\u00e9s offertes par Security for Asterisk (SECast). De la d\u00e9tection de la fraude et du piratage au blocage des attaquants au bord du r\u00e9seau.","breadcrumb":{"@id":"https:\/\/telium.io\/fr\/securite-pour-asterisk\/fonctionnalites\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/telium.io\/fr\/securite-pour-asterisk\/fonctionnalites\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/telium.io\/fr\/securite-pour-asterisk\/fonctionnalites\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/telium.io\/fr\/accueil\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 pour Asterisk","item":"https:\/\/telium.io\/fr\/securite-pour-asterisk\/"},{"@type":"ListItem","position":3,"name":"Fonctionnalit\u00e9s"}]},{"@type":"WebSite","@id":"https:\/\/telium.io\/fr\/#website","url":"https:\/\/telium.io\/fr\/","name":"Telium","description":"T\u00e9l\u00e9phonie et T\u00e9l\u00e9matique","publisher":{"@id":"https:\/\/telium.io\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/telium.io\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/telium.io\/fr\/#organization","name":"Telium","url":"https:\/\/telium.io\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/telium.io\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","contentUrl":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","width":800,"height":800,"caption":"Telium"},"image":{"@id":"https:\/\/telium.io\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","https:\/\/x.com\/telium_io","https:\/\/ca.linkedin.com\/company\/telium"]}]}},"_links":{"self":[{"href":"https:\/\/telium.io\/fr\/wp-json\/wp\/v2\/pages\/12449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telium.io\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/telium.io\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/telium.io\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/telium.io\/fr\/wp-json\/wp\/v2\/comments?post=12449"}],"version-history":[{"count":10,"href":"https:\/\/telium.io\/fr\/wp-json\/wp\/v2\/pages\/12449\/revisions"}],"predecessor-version":[{"id":18128,"href":"https:\/\/telium.io\/fr\/wp-json\/wp\/v2\/pages\/12449\/revisions\/18128"}],"up":[{"embeddable":true,"href":"https:\/\/telium.io\/fr\/wp-json\/wp\/v2\/pages\/12317"}],"wp:attachment":[{"href":"https:\/\/telium.io\/fr\/wp-json\/wp\/v2\/media?parent=12449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}