1:"$Sreact.fragment" 2:I[1558,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 3:I[9766,[],""] 4:I[8924,[],""] 5:I[635,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 6:I[2659,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 7:I[3734,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 8:I[1356,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","3916","static/chunks/app/partenaires/bitdefender/page-c53691f57fe7f4c7.js"],"Image"] 9:I[2619,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","3916","static/chunks/app/partenaires/bitdefender/page-c53691f57fe7f4c7.js"],""] 17:I[7150,[],""] :HL["/_next/static/css/37ed598c858eca7c.css","style"] 0:{"P":null,"b":"VJGL_Iz-oLBf86TGKroGj","p":"","c":["","partenaires","bitdefender"],"i":false,"f":[[["",{"children":["partenaires",{"children":["bitdefender",{"children":["__PAGE__",{}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/37ed598c858eca7c.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"fr","children":["$","body",null,{"className":"__className_f367f3 __variable_dc381d font-sans antialiased","children":[["$","$L2",null,{}],["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[["$","main",null,{"className":"mx-auto max-w-2xl px-6 py-24 text-center","children":[["$","h1",null,{"className":"text-3xl font-bold","children":"Page introuvable"}],["$","a",null,{"href":"/","className":"mt-6 inline-block rounded-xl bg-black px-4 py-2 text-white","children":"Retour à l’accueil"}]]}],[]],"forbidden":"$undefined","unauthorized":"$undefined"}],["$","$L5",null,{}],["$","$L6",null,{}],["$","$L7",null,{}]]}]}]]}],{"children":["partenaires",["$","$1","c",{"children":[null,["$","html",null,{"lang":"en","children":["$","body",null,{"children":["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]}]}]]}],{"children":["bitdefender",["$","$1","c",{"children":[null,["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","main",null,{"className":"px-6 py-12 md:px-10 lg:px-16","children":[["$","section",null,{"className":"mx-auto max-w-6xl","children":["$","div",null,{"className":"grid items-center gap-8 lg:grid-cols-2","children":[["$","div",null,{"children":[["$","$L8",null,{"src":"/partners/bitdefender/bitdefender-logo.png","alt":"Bitdefender / NewTechIT","width":320,"height":90,"priority":true,"className":"mb-6"}],["$","h1",null,{"className":"font-brand text-3xl md:text-4xl tracking-tight text-ink-800","children":"Bitdefender — Sécurité Endpoint & XDR pour entreprises"}],["$","p",null,{"className":"mt-4 max-w-2xl text-ink-600","children":["NewTechIT, partenaire Bitdefender, propose l’intégration, le déploiement et la gestion des solutions",["$","strong",null,{"children":" Bitdefender GravityZone"}]," pour protéger vos endpoints, serveurs et environnements virtualisés. Nous accompagnons la mise en place d’",["$","strong",null,{"children":"EDR/XDR"}],", le hardening des politiques et les processus de réponse aux incidents."]}],["$","div",null,{"className":"mt-6 flex flex-wrap gap-3","children":[["$","$L9",null,{"href":"/contact","className":"inline-flex items-center rounded-md bg-ink-900 px-5 py-2 text-white shadow-sm hover:opacity-95","children":"Demander une démo"}],["$","a",null,{"href":"/assets/bitdefender-datasheet.pdf","className":"inline-flex items-center rounded-md border border-ink-200 px-5 py-2 text-ink-700 hover:bg-ink-50","children":"Télécharger la fiche produit (PDF)"}]]}]]}],["$","div",null,{"children":["$","div",null,{"className":"rounded-xl border border-ink-100 bg-gradient-to-tr from-white to-ink-50 p-6 shadow-sm","children":[["$","$L8",null,{"src":"/partners/bitdefender/hero-security.jpg","alt":"Protection Bitdefender pour endpoints, serveurs et cloud","width":800,"height":450,"className":"rounded-md object-cover"}],["$","p",null,{"className":"mt-3 text-sm text-ink-500","children":"Protection multi-couches : endpoints, serveurs, workloads cloud et environnements virtualisés."}]]}]}]]}]}],["$","section",null,{"className":"mx-auto mt-12 max-w-6xl","children":[["$","h2",null,{"className":"mb-6 border-l-4 border-ink-900 pl-4 text-xl font-semibold","children":"Produits & Solutions Bitdefender"}],["$","div",null,{"className":"grid gap-6 sm:grid-cols-2 lg:grid-cols-3","children":[["$","article",null,{"className":"rounded-lg border border-ink-100 bg-white p-5 shadow-sm","children":[["$","h3",null,{"className":"font-medium","children":"GravityZone Business / Advanced / Ultra"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Plateforme unifiée pour la gestion centralisée des endpoints, serveurs et machines virtuelles, avec politiques granulaires et reporting détaillé."}]]}],"$La","$Lb","$Lc","$Ld","$Le"]}]]}],"$Lf","$L10","$L11","$L12","$L13","$L14"]}],null,"$L15"]}],{},null,false]},null,false]},null,false]},null,false],"$L16",false]],"m":"$undefined","G":["$17",[]],"s":false,"S":true} 18:I[5717,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","3916","static/chunks/app/partenaires/bitdefender/page-c53691f57fe7f4c7.js"],"default"] 19:I[4431,[],"OutletBoundary"] 1b:I[5278,[],"AsyncMetadataOutlet"] 1d:I[4431,[],"ViewportBoundary"] 1f:I[4431,[],"MetadataBoundary"] 20:"$Sreact.suspense" a:["$","article",null,{"className":"rounded-lg border border-ink-100 bg-white p-5 shadow-sm","children":[["$","h3",null,{"className":"font-medium","children":"EDR / XDR"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Détection comportementale, investigation et orchestration de la réponse aux incidents avec corrélation multi-vecteurs."}]]}] b:["$","article",null,{"className":"rounded-lg border border-ink-100 bg-white p-5 shadow-sm","children":[["$","h3",null,{"className":"font-medium","children":"Protection Ransomware"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Technologies anti-ransomware, contrôle de comportement, surveillance des process sensibles et mécanismes de rollback."}]]}] c:["$","article",null,{"className":"rounded-lg border border-ink-100 bg-white p-5 shadow-sm","children":[["$","h3",null,{"className":"font-medium","children":"Security for Virtualized Environments"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Agents optimisés et intégration profonde avec VMware, Hyper-V ou Nutanix pour une performance maximale et une consommation réduite de ressources."}]]}] d:["$","article",null,{"className":"rounded-lg border border-ink-100 bg-white p-5 shadow-sm","children":[["$","h3",null,{"className":"font-medium","children":"Cloud & SaaS Protection"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Protection des workloads cloud, environnements hybrides et applications SaaS critiques."}]]}] e:["$","article",null,{"className":"rounded-lg border border-ink-100 bg-white p-5 shadow-sm","children":[["$","h3",null,{"className":"font-medium","children":"MDR / Services managés (via NewTechIT)"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Supervision 24/7, investigation et réponse pilotées par nos ingénieurs, avec rapports réguliers et recommandations d’amélioration."}]]}] f:["$","section",null,{"className":"mx-auto mt-12 max-w-6xl","children":[["$","h2",null,{"className":"mb-6 border-l-4 border-ink-900 pl-4 text-xl font-semibold","children":"Pourquoi choisir Bitdefender avec NewTechIT ?"}],["$","div",null,{"className":"grid gap-6 sm:grid-cols-2 lg:grid-cols-3","children":[["$","article","Protection End-to-End",{"className":"rounded-lg border border-ink-100 bg-white p-5 shadow-sm","children":[["$","h3",null,{"className":"font-semibold","children":"Protection End-to-End"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Endpoints, serveurs et machines virtuelles protégés contre ransomwares et menaces zero-day."}]]}],["$","article","GravityZone Platform",{"className":"rounded-lg border border-ink-100 bg-white p-5 shadow-sm","children":[["$","h3",null,{"className":"font-semibold","children":"GravityZone Platform"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Console centralisée pour gestion EDR/XDR, politiques, mises à jour et rapports."}]]}],["$","article","XDR & EDR",{"className":"rounded-lg border border-ink-100 bg-white p-5 shadow-sm","children":[["$","h3",null,{"className":"font-semibold","children":"XDR & EDR"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Détection avancée, investigation, corrélation et réponse automatisée aux incidents."}]]}],["$","article","Optimisé pour la virtualisation",{"className":"rounded-lg border border-ink-100 bg-white p-5 shadow-sm","children":[["$","h3",null,{"className":"font-semibold","children":"Optimisé pour la virtualisation"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Faible empreinte sur les hyperviseurs (VMware, Hyper-V, Nutanix, etc.)."}]]}],["$","article","Services managés",{"className":"rounded-lg border border-ink-100 bg-white p-5 shadow-sm","children":[["$","h3",null,{"className":"font-semibold","children":"Services managés"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Déploiement, tuning, gestion des incidents et monitoring 24/7 par NewTechIT."}]]}]]}]]}] 10:["$","section",null,{"className":"mx-auto mt-12 max-w-6xl","children":["$","$L18",null,{}]}] 11:["$","section",null,{"className":"mx-auto mt-12 max-w-6xl","children":[["$","h2",null,{"className":"mb-6 border-l-4 border-ink-900 pl-4 text-xl font-semibold","children":"Présentations produit (vidéos)"}],["$","div",null,{"className":"grid gap-8 lg:grid-cols-2","children":[["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-medium","children":"Bitdefender – Wherever you go, go with Trust"}],["$","div",null,{"className":"relative w-full overflow-hidden rounded-xl border border-ink-200 bg-black shadow-sm","style":{"paddingTop":"56.25%"},"children":["$","iframe",null,{"className":"absolute left-0 top-0 h-full w-full","src":"https://www.youtube.com/embed/un_WRN-2GHQ","title":"Bitdefender. Wherever you go, go with Trust.","loading":"lazy","referrerPolicy":"strict-origin-when-cross-origin","allow":"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share","allowFullScreen":true}]}],["$","p",null,{"className":"mt-3 text-sm text-ink-500","children":"Bitdefender illustre sa vision : protection de confiance, partout où vont vos utilisateurs."}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-medium","children":"Why Bitdefender – The Mission"}],["$","div",null,{"className":"relative w-full overflow-hidden rounded-xl border border-ink-200 bg-black shadow-sm","style":{"paddingTop":"56.25%"},"children":["$","iframe",null,{"className":"absolute left-0 top-0 h-full w-full","src":"https://www.youtube.com/embed/IVlmkgOS3aI","title":"Why Bitdefender – The Mission","loading":"lazy","referrerPolicy":"strict-origin-when-cross-origin","allow":"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share","allowFullScreen":true}]}],["$","p",null,{"className":"mt-3 text-sm text-ink-500","children":"Présentation de la mission Bitdefender et de son approche de la cybersécurité."}]]}]]}]]}] 12:["$","section",null,{"className":"mx-auto mt-12 max-w-6xl","children":[["$","h2",null,{"className":"mb-6 border-l-4 border-ink-900 pl-4 text-xl font-semibold","children":"Écosystème sécurité & compatibilités"}],["$","div",null,{"className":"flex flex-wrap items-center gap-6","children":[["$","div",null,{"className":"flex h-16 w-48 items-center justify-center rounded-md bg-white","children":["$","$L8",null,{"src":"/partners/bitdefender/logo-bitdefender.svg","alt":"Bitdefender","width":220,"height":64}]}],["$","div",null,{"className":"flex h-12 w-36 items-center justify-center rounded-md bg-white","children":["$","$L8",null,{"src":"/partners/veeam.svg","alt":"Veeam","width":140,"height":48}]}],["$","div",null,{"className":"flex h-12 w-36 items-center justify-center rounded-md bg-white","children":["$","$L8",null,{"src":"/partners/zabbix/logo-zabbix.png","alt":"Zabbix","width":140,"height":48}]}]]}]]}] 13:["$","section",null,{"className":"mx-auto mt-12 max-w-6xl","children":["$","div",null,{"className":"rounded-xl border border-ink-100 bg-white p-6 text-center shadow-sm","children":[["$","h3",null,{"className":"text-xl font-semibold","children":"Prêt à renforcer votre sécurité avec Bitdefender ?"}],["$","p",null,{"className":"mt-3 text-ink-600","children":"Contactez NewTechIT pour une évaluation gratuite de vos endpoints et une démonstration personnalisée de GravityZone et des capacités EDR/XDR."}],["$","div",null,{"className":"mt-4 flex justify-center gap-3","children":[["$","$L9",null,{"href":"/contact","className":"inline-flex items-center rounded-md bg-ink-900 px-5 py-2 text-white hover:opacity-95","children":"Contactez-nous"}],["$","a",null,{"href":"/assets/bitdefender-offre.pdf","className":"inline-flex items-center rounded-md border border-ink-200 px-5 py-2 text-ink-700 hover:bg-ink-50","children":"Voir l'offre"}]]}]]}]}] 14:["$","div",null,{"className":"mt-16"}] 15:["$","$L19",null,{"children":["$L1a",["$","$L1b",null,{"promise":"$@1c"}]]}] 16:["$","$1","h",{"children":[null,[["$","$L1d",null,{"children":"$L1e"}],null],["$","$L1f",null,{"children":["$","div",null,{"hidden":true,"children":["$","$20",null,{"fallback":null,"children":"$L21"}]}]}]]}] 1e:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}],["$","meta","2",{"name":"theme-color","media":"(prefers-color-scheme: light)","content":"#1f84ff"}],["$","meta","3",{"name":"theme-color","media":"(prefers-color-scheme: dark)","content":"#1f84ff"}],["$","meta","4",{"name":"color-scheme","content":"light dark"}]] 1a:null 22:I[622,[],"IconMark"] 1c:{"metadata":[["$","title","0",{"children":"Bitdefender – Solutions de cybersécurité | NewTechIT Maroc"}],["$","meta","1",{"name":"description","content":"Partenaire Bitdefender : protection endpoint, EDR/XDR, GravityZone, sécurité des serveurs et environnements virtualisés. NewTechIT assure l'intégration, le déploiement et le suivi opérationnel."}],["$","link","2",{"rel":"manifest","href":"/site.webmanifest","crossOrigin":"$undefined"}],["$","meta","3",{"name":"robots","content":"index, follow"}],["$","meta","4",{"name":"googlebot","content":"index, follow, max-video-preview:-1, max-image-preview:large, max-snippet:-1"}],["$","link","5",{"rel":"canonical","href":"https://www.newtechit.ma/partenaires/bitdefender"}],["$","meta","6",{"property":"og:title","content":"Bitdefender – Solutions de cybersécurité | NewTechIT Maroc"}],["$","meta","7",{"property":"og:description","content":"Partenaire Bitdefender – sécurité endpoint, EDR/XDR, GravityZone. Intégration, déploiement, support et services managés par NewTechIT."}],["$","meta","8",{"property":"og:url","content":"https://www.newtechit.ma/partenaires/bitdefender"}],["$","meta","9",{"property":"og:image","content":"https://www.newtechit.ma/partners/bitdefender/og-bitdefender.jpg"}],["$","meta","10",{"property":"og:type","content":"article"}],["$","meta","11",{"name":"twitter:card","content":"summary_large_image"}],["$","meta","12",{"name":"twitter:title","content":"Bitdefender – Solutions de cybersécurité | NewTechIT Maroc"}],["$","meta","13",{"name":"twitter:description","content":"Sécurisez vos endpoints, serveurs et environnements virtualisés avec Bitdefender GravityZone, EDR/XDR et les services managés NewTechIT."}],["$","meta","14",{"name":"twitter:image","content":"https://www.newtechit.ma/partners/bitdefender/og-bitdefender.jpg"}],["$","link","15",{"rel":"icon","href":"/favicon.ico"}],["$","link","16",{"rel":"apple-touch-icon","href":"/apple-touch-icon.png"}],["$","$L22","17",{}]],"error":null,"digest":"$undefined"} 21:"$1c:metadata"