1:"$Sreact.fragment" 2:I[1558,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 3:I[9766,[],""] 4:I[8924,[],""] 5:I[635,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 6:I[2659,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 7:I[3734,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 8:I[1356,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","9671","static/chunks/app/partenaires/fortinet/page-3f116664b92b36ae.js"],"Image"] 15:I[7150,[],""] :HL["/_next/static/css/37ed598c858eca7c.css","style"] 0:{"P":null,"b":"VJGL_Iz-oLBf86TGKroGj","p":"","c":["","partenaires","fortinet"],"i":false,"f":[[["",{"children":["partenaires",{"children":["fortinet",{"children":["__PAGE__",{}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/37ed598c858eca7c.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"fr","children":["$","body",null,{"className":"__className_f367f3 __variable_dc381d font-sans antialiased","children":[["$","$L2",null,{}],["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[["$","main",null,{"className":"mx-auto max-w-2xl px-6 py-24 text-center","children":[["$","h1",null,{"className":"text-3xl font-bold","children":"Page introuvable"}],["$","a",null,{"href":"/","className":"mt-6 inline-block rounded-xl bg-black px-4 py-2 text-white","children":"Retour à l’accueil"}]]}],[]],"forbidden":"$undefined","unauthorized":"$undefined"}],["$","$L5",null,{}],["$","$L6",null,{}],["$","$L7",null,{}]]}]}]]}],{"children":["partenaires",["$","$1","c",{"children":[null,["$","html",null,{"lang":"en","children":["$","body",null,{"children":["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]}]}]]}],{"children":["fortinet",["$","$1","c",{"children":[null,["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","main",null,{"className":"px-6 py-12 md:px-10 lg:px-16","children":[["$","section",null,{"className":"mx-auto max-w-6xl","children":["$","div",null,{"className":"grid items-center gap-8 md:grid-cols-[auto,1fr]","children":[["$","div",null,{"className":"flex flex-col items-center md:items-start","children":[["$","$L8",null,{"src":"/partners/fortinet/fortinet-logo.svg","alt":"Fortinet logo","width":220,"height":80,"className":"mb-4","priority":true}],["$","h1",null,{"className":"font-brand text-3xl md:text-4xl tracking-tight text-ink-700 text-center md:text-left","children":"Fortinet – La cybersécurité unifiée avec NewTechIT"}]]}],["$","div",null,{"children":["$","p",null,{"className":"text-ink-600 leading-relaxed","children":[["$","strong",null,{"children":"NewTechIT"}]," intègre l’écosystème ",["$","strong",null,{"children":"Fortinet"}]," (NGFW, SD-WAN, Wi-Fi, SOC, EDR) avec une expertise certifiée ",["$","strong",null,{"children":"NSE"}]," et des projets réalisés au Maroc et en Afrique. Conception, intégration, ",["$","strong",null,{"children":"MCO"}],"/",["$","strong",null,{"children":"SOC"}]," et conformité"," ",["$","strong",null,{"children":"ISO 27001"}]," : nous sécurisons votre S.I. de bout en bout, du périmètre au poste de travail."]}]}]]}]}],["$","section",null,{"className":"mx-auto mt-12 max-w-6xl","children":[["$","h2",null,{"className":"mb-6 border-l-4 border-ink-900 pl-4 text-xl font-semibold text-ink-800","children":"Portefeuille de solutions Fortinet"}],["$","div",null,{"className":"grid gap-6 sm:grid-cols-2 lg:grid-cols-3","children":[["$","article","FortiGate (Pare-feu NGFW)",{"className":"border border-ink-200 rounded-2xl bg-white p-6 text-center shadow-sm transition hover:shadow-md","children":[["$","$L8",null,{"src":"/partners/fortinet/fortigate.png","alt":"FortiGate (Pare-feu NGFW)","width":80,"height":80,"className":"mx-auto mb-4 object-contain"}],["$","h3",null,{"className":"mb-2 text-lg font-semibold text-ink-700","children":"FortiGate (Pare-feu NGFW)"}],["$","p",null,{"className":"text-sm leading-relaxed text-ink-600","children":"Protection périmétrique, IPS/IDS, Application Control, VPN IPsec/SSL, SD-WAN et filtrage Web. HA actif/passif."}]]}],["$","article","FortiAnalyzer",{"className":"border border-ink-200 rounded-2xl bg-white p-6 text-center shadow-sm transition hover:shadow-md","children":[["$","$L8",null,{"src":"/partners/fortinet/fortianalyzer.png","alt":"FortiAnalyzer","width":80,"height":80,"className":"mx-auto mb-4 object-contain"}],["$","h3",null,{"className":"mb-2 text-lg font-semibold text-ink-700","children":"FortiAnalyzer"}],["$","p",null,{"className":"text-sm leading-relaxed text-ink-600","children":"Analyse centralisée des logs, rapports de conformité, corrélation d’événements et supervision SOC."}]]}],"$L9","$La","$Lb","$Lc","$Ld","$Le","$Lf"]}]]}],"$L10","$L11","$L12"]}],null,"$L13"]}],{},null,false]},null,false]},null,false]},null,false],"$L14",false]],"m":"$undefined","G":["$15",[]],"s":false,"S":true} 16:I[1592,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","9671","static/chunks/app/partenaires/fortinet/page-3f116664b92b36ae.js"],"default"] 17:I[2619,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","9671","static/chunks/app/partenaires/fortinet/page-3f116664b92b36ae.js"],""] 18:I[4431,[],"OutletBoundary"] 1a:I[5278,[],"AsyncMetadataOutlet"] 1c:I[4431,[],"ViewportBoundary"] 1e:I[4431,[],"MetadataBoundary"] 1f:"$Sreact.suspense" 9:["$","article","FortiManager",{"className":"border border-ink-200 rounded-2xl bg-white p-6 text-center shadow-sm transition hover:shadow-md","children":[["$","$L8",null,{"src":"/partners/fortinet/fortimanager.png","alt":"FortiManager","width":80,"height":80,"className":"mx-auto mb-4 object-contain"}],["$","h3",null,{"className":"mb-2 text-lg font-semibold text-ink-700","children":"FortiManager"}],["$","p",null,{"className":"text-sm leading-relaxed text-ink-600","children":"Gestion centralisée des politiques, multi-sites, automatisation des déploiements (Infra-as-Code)."}]]}] a:["$","article","FortiSwitch",{"className":"border border-ink-200 rounded-2xl bg-white p-6 text-center shadow-sm transition hover:shadow-md","children":[["$","$L8",null,{"src":"/partners/fortinet/fortiswitch.png","alt":"FortiSwitch","width":80,"height":80,"className":"mx-auto mb-4 object-contain"}],["$","h3",null,{"className":"mb-2 text-lg font-semibold text-ink-700","children":"FortiSwitch"}],["$","p",null,{"className":"text-sm leading-relaxed text-ink-600","children":"Switching sécurisé intégré à FortiGate via FortiLink pour une gestion unifiée réseau + sécurité."}]]}] b:["$","article","FortiAP",{"className":"border border-ink-200 rounded-2xl bg-white p-6 text-center shadow-sm transition hover:shadow-md","children":[["$","$L8",null,{"src":"/partners/fortinet/fortiap.png","alt":"FortiAP","width":80,"height":80,"className":"mx-auto mb-4 object-contain"}],["$","h3",null,{"className":"mb-2 text-lg font-semibold text-ink-700","children":"FortiAP"}],["$","p",null,{"className":"text-sm leading-relaxed text-ink-600","children":"Wi-Fi professionnel sécurisé, administration via FortiGate/FortiCloud, WPA3, 802.1X, invités/portail captif."}]]}] c:["$","article","FortiClient & FortiEDR",{"className":"border border-ink-200 rounded-2xl bg-white p-6 text-center shadow-sm transition hover:shadow-md","children":[["$","$L8",null,{"src":"/partners/fortinet/forticlient.png","alt":"FortiClient & FortiEDR","width":80,"height":80,"className":"mx-auto mb-4 object-contain"}],["$","h3",null,{"className":"mb-2 text-lg font-semibold text-ink-700","children":"FortiClient & FortiEDR"}],["$","p",null,{"className":"text-sm leading-relaxed text-ink-600","children":"Protection endpoint (AV/EDR), VPN/ZTNA, visibilité et réponse automatisée aux menaces."}]]}] d:["$","article","FortiMail",{"className":"border border-ink-200 rounded-2xl bg-white p-6 text-center shadow-sm transition hover:shadow-md","children":[["$","$L8",null,{"src":"/partners/fortinet/fortimail.png","alt":"FortiMail","width":80,"height":80,"className":"mx-auto mb-4 object-contain"}],["$","h3",null,{"className":"mb-2 text-lg font-semibold text-ink-700","children":"FortiMail"}],["$","p",null,{"className":"text-sm leading-relaxed text-ink-600","children":"Sécurisation e-mail : anti-phishing, anti-spam, sandboxing, DMARC/DKIM/SPF."}]]}] e:["$","article","FortiNAC",{"className":"border border-ink-200 rounded-2xl bg-white p-6 text-center shadow-sm transition hover:shadow-md","children":[["$","$L8",null,{"src":"/partners/fortinet/fortinac.png","alt":"FortiNAC","width":80,"height":80,"className":"mx-auto mb-4 object-contain"}],["$","h3",null,{"className":"mb-2 text-lg font-semibold text-ink-700","children":"FortiNAC"}],["$","p",null,{"className":"text-sm leading-relaxed text-ink-600","children":"Contrôle d’accès réseau (IoT/BYOD), posture, segmentation dynamique et mise en quarantaine."}]]}] f:["$","article","FortiSIEM & FortiSOAR",{"className":"border border-ink-200 rounded-2xl bg-white p-6 text-center shadow-sm transition hover:shadow-md","children":[["$","$L8",null,{"src":"/partners/fortinet/fortisiem.png","alt":"FortiSIEM & FortiSOAR","width":80,"height":80,"className":"mx-auto mb-4 object-contain"}],["$","h3",null,{"className":"mb-2 text-lg font-semibold text-ink-700","children":"FortiSIEM & FortiSOAR"}],["$","p",null,{"className":"text-sm leading-relaxed text-ink-600","children":"SIEM + automatisation SOC : corrélation, playbooks, réduction des MTTD/MTTR."}]]}] 10:["$","section",null,{"className":"mx-auto mt-16 max-w-6xl","children":["$","$L16",null,{}]}] 11:["$","section",null,{"className":"mx-auto mt-16 max-w-6xl","children":[["$","h2",null,{"className":"mb-6 text-center font-brand text-2xl md:text-3xl text-ink-700","children":"Vidéos Fortinet"}],["$","div",null,{"className":"grid gap-6 md:grid-cols-2","children":[["$","article",null,{"className":"overflow-hidden rounded-2xl border border-ink-200 bg-white shadow-sm","children":[["$","div",null,{"className":"aspect-video","children":["$","iframe",null,{"className":"h-full w-full","src":"https://www.youtube.com/embed/HmTO5P_Yqm0","title":"FortiGate 90G – Présentation","loading":"lazy","allow":"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share","allowFullScreen":true}]}],["$","div",null,{"className":"p-4","children":[["$","h3",null,{"className":"font-semibold text-ink-700","children":"FortiGate 90G – Présentation"}],["$","p",null,{"className":"text-sm text-ink-600","children":"Aperçu de la plateforme de cybersécurité Fortinet et des capacités NGFW/SD-WAN."}]]}]]}],["$","article",null,{"className":"overflow-hidden rounded-2xl border border-ink-200 bg-white shadow-sm","children":[["$","div",null,{"className":"aspect-video","children":["$","iframe",null,{"className":"h-full w-full","src":"https://www.youtube.com/embed/kSBqUAU6kvI","title":"FortiSwitches – Official video","loading":"lazy","allow":"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share","allowFullScreen":true}]}],["$","div",null,{"className":"p-4","children":[["$","h3",null,{"className":"font-semibold text-ink-700","children":"FortiSwitches – Aperçu"}],["$","p",null,{"className":"text-sm text-ink-600","children":"Commutation sécurisée intégrée via FortiLink et pilotée depuis FortiGate."}]]}]]}]]}]]}] 12:["$","section",null,{"className":"mx-auto mt-16 max-w-6xl","children":["$","div",null,{"className":"rounded-2xl border border-ink-200 bg-ink-50 p-8 text-center md:p-10","children":[["$","h2",null,{"className":"mb-3 text-2xl font-semibold text-ink-700","children":"Sécurisez votre infrastructure avec Fortinet & NewTechIT"}],["$","p",null,{"className":"mx-auto max-w-2xl text-ink-600","children":["Architecture Fortinet intégrée (",["$","strong",null,{"children":"FortiGate"}],", ",["$","strong",null,{"children":"SD-WAN"}],", ",["$","strong",null,{"children":"Wi-Fi"}],","," ",["$","strong",null,{"children":"NAC"}],", ",["$","strong",null,{"children":"SOC"}],", ",["$","strong",null,{"children":"EDR"}],") alignée à vos enjeux métiers, de performance et de conformité (",["$","strong",null,{"children":"ISO 27001"}],", politique sécurité, PRA…)."]}],["$","div",null,{"className":"mt-6 flex justify-center","children":["$","$L17",null,{"href":"/contact","className":"inline-block rounded-lg bg-ink-900 px-6 py-3 text-sm font-medium text-white transition hover:opacity-95","children":"Contacter nos experts Fortinet"}]}]]}]}] 13:["$","$L18",null,{"children":["$L19",["$","$L1a",null,{"promise":"$@1b"}]]}] 14:["$","$1","h",{"children":[null,[["$","$L1c",null,{"children":"$L1d"}],null],["$","$L1e",null,{"children":["$","div",null,{"hidden":true,"children":["$","$1f",null,{"fallback":null,"children":"$L20"}]}]}]]}] 1d:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}],["$","meta","2",{"name":"theme-color","media":"(prefers-color-scheme: light)","content":"#1f84ff"}],["$","meta","3",{"name":"theme-color","media":"(prefers-color-scheme: dark)","content":"#1f84ff"}],["$","meta","4",{"name":"color-scheme","content":"light dark"}]] 19:null 21:I[622,[],"IconMark"] 1b:{"metadata":[["$","title","0",{"children":"Fortinet – Sécurité Réseau, SOC & SD-WAN | NewTechIT Maroc"}],["$","meta","1",{"name":"description","content":"Intégrateur Fortinet au Maroc et en Afrique : FortiGate, FortiAnalyzer, FortiManager, FortiClient, FortiEDR, FortiSwitch, FortiAP, FortiMail, FortiNAC, FortiSIEM/SOAR. Experts certifiés NSE, SOC & SD-WAN."}],["$","link","2",{"rel":"manifest","href":"/site.webmanifest","crossOrigin":"$undefined"}],["$","meta","3",{"name":"robots","content":"index, follow"}],["$","meta","4",{"name":"googlebot","content":"index, follow, max-video-preview:-1, max-image-preview:large, max-snippet:-1"}],["$","link","5",{"rel":"canonical","href":"https://www.newtechit.ma/partenaires/fortinet"}],["$","meta","6",{"property":"og:title","content":"Fortinet – Sécurité Réseau, SOC & SD-WAN | NewTechIT Maroc"}],["$","meta","7",{"property":"og:description","content":"NewTechIT intègre l’écosystème Fortinet (FortiGate, FortiAnalyzer, FortiManager, FortiSwitch, FortiAP, FortiMail, FortiClient/EDR, FortiNAC, FortiSIEM/SOAR) avec une expertise NSE et SOC."}],["$","meta","8",{"property":"og:url","content":"https://www.newtechit.ma/partenaires/fortinet"}],["$","meta","9",{"property":"og:image","content":"https://www.newtechit.ma/partners/fortinet/og-fortinet.jpg"}],["$","meta","10",{"property":"og:type","content":"article"}],["$","meta","11",{"name":"twitter:card","content":"summary_large_image"}],["$","meta","12",{"name":"twitter:title","content":"Fortinet – Sécurité Réseau, SOC & SD-WAN | NewTechIT Maroc"}],["$","meta","13",{"name":"twitter:description","content":"Pare-feux FortiGate, SD-WAN, Wi-Fi, NAC, SOC, EDR/XDR : NewTechIT conçoit, intègre et opère vos architectures Fortinet."}],["$","meta","14",{"name":"twitter:image","content":"https://www.newtechit.ma/partners/fortinet/og-fortinet.jpg"}],["$","link","15",{"rel":"icon","href":"/favicon.ico"}],["$","link","16",{"rel":"apple-touch-icon","href":"/apple-touch-icon.png"}],["$","$L21","17",{}]],"error":null,"digest":"$undefined"} 20:"$1b:metadata"