1:"$Sreact.fragment" 2:I[1558,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 3:I[9766,[],""] 4:I[8924,[],""] 5:I[635,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 6:I[2659,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 7:I[3734,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 8:I[1356,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","6569","static/chunks/app/partenaires/kaspersky/page-604cdee72368623c.js"],"Image"] 9:I[2619,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","6569","static/chunks/app/partenaires/kaspersky/page-604cdee72368623c.js"],""] 12:I[7150,[],""] :HL["/_next/static/css/37ed598c858eca7c.css","style"] 0:{"P":null,"b":"VJGL_Iz-oLBf86TGKroGj","p":"","c":["","partenaires","kaspersky"],"i":false,"f":[[["",{"children":["partenaires",{"children":["kaspersky",{"children":["__PAGE__",{}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/37ed598c858eca7c.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"fr","children":["$","body",null,{"className":"__className_f367f3 __variable_dc381d font-sans antialiased","children":[["$","$L2",null,{}],["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[["$","main",null,{"className":"mx-auto max-w-2xl px-6 py-24 text-center","children":[["$","h1",null,{"className":"text-3xl font-bold","children":"Page introuvable"}],["$","a",null,{"href":"/","className":"mt-6 inline-block rounded-xl bg-black px-4 py-2 text-white","children":"Retour à l’accueil"}]]}],[]],"forbidden":"$undefined","unauthorized":"$undefined"}],["$","$L5",null,{}],["$","$L6",null,{}],["$","$L7",null,{}]]}]}]]}],{"children":["partenaires",["$","$1","c",{"children":[null,["$","html",null,{"lang":"en","children":["$","body",null,{"children":["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]}]}]]}],{"children":["kaspersky",["$","$1","c",{"children":[null,["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","main",null,{"className":"px-6 py-10 md:px-10 lg:px-16","children":[["$","section",null,{"className":"mx-auto max-w-6xl","children":["$","div",null,{"className":"flex flex-col items-start gap-6 rounded-2xl border border-ink-100 bg-ink-50/60 p-6 shadow-sm md:p-10","children":[["$","div",null,{"className":"flex items-center gap-4","children":[["$","$L8",null,{"src":"/partners/kaspersky/kaspersky.svg","alt":"Kaspersky","width":160,"height":48,"priority":true}],["$","span",null,{"className":"rounded-full border border-ink-200 bg-white px-3 py-1 text-xs font-medium text-ink-700","children":"Partenaire intégrateur"}]]}],["$","h1",null,{"className":"font-brand text-2xl tracking-wide text-ink-700 md:text-3xl","children":"Kaspersky – Sécurité Endpoint, EDR/XDR & SOC"}],["$","p",null,{"className":"max-w-3xl text-ink-600","children":["NewTechIT intègre et opère les solutions ",["$","strong",null,{"children":"Kaspersky"}]," pour protéger vos endpoints, serveurs, environnements cloud et messageries. Nos équipes vous accompagnent du ",["$","strong",null,{"children":"design"}]," à l’",["$","strong",null,{"children":"exploitation"}]," (MCO/infogérance), avec des engagements ",["$","strong",null,{"children":"SLA"}]," et un reporting sécurité orienté résultats."]}],["$","div",null,{"className":"flex flex-wrap gap-3","children":[["$","$L9",null,{"href":"/contact","className":"rounded-xl bg-ink-900 px-5 py-2.5 text-white hover:bg-ink-800","children":"Demander une démo"}],["$","$L9",null,{"href":"/services/cybersecurite","className":"rounded-xl border border-ink-200 bg-white px-5 py-2.5 text-ink-700 hover:bg-ink-50","children":"Intégration & SOC by NewTechIT"}]]}]]}]}],["$","section",null,{"className":"mx-auto mt-10 max-w-6xl","children":["$","div",null,{"className":"grid gap-4 md:grid-cols-3","children":[["$","div","Protection complète",{"className":"rounded-2xl border border-ink-100 bg-white p-6 shadow-sm","children":[["$","h3",null,{"className":"text-lg font-semibold text-ink-700","children":"Protection complète"}],["$","p",null,{"className":"mt-2 text-ink-600","children":"Prévention, détection, réponse et remédiation unifiées sur tout le parc."}]]}],["$","div","Visibilité & conformité",{"className":"rounded-2xl border border-ink-100 bg-white p-6 shadow-sm","children":[["$","h3",null,{"className":"text-lg font-semibold text-ink-700","children":"Visibilité & conformité"}],["$","p",null,{"className":"mt-2 text-ink-600","children":"Dashboards, inventaires, posture sécurité et rapports d’audit."}]]}],["$","div","Opérations simplifiées",{"className":"rounded-2xl border border-ink-100 bg-white p-6 shadow-sm","children":["$La","$Lb"]}]]}]}],"$Lc","$Ld","$Le","$Lf"]}],null,"$L10"]}],{},null,false]},null,false]},null,false]},null,false],"$L11",false]],"m":"$undefined","G":["$12",[]],"s":false,"S":true} 17:I[8414,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","6569","static/chunks/app/partenaires/kaspersky/page-604cdee72368623c.js"],"default"] 18:I[4431,[],"OutletBoundary"] 1a:I[5278,[],"AsyncMetadataOutlet"] 1c:I[4431,[],"ViewportBoundary"] 1e:I[4431,[],"MetadataBoundary"] 1f:"$Sreact.suspense" a:["$","h3",null,{"className":"text-lg font-semibold text-ink-700","children":"Opérations simplifiées"}] b:["$","p",null,{"className":"mt-2 text-ink-600","children":"Politiques centralisées, playbooks et réponse automatisée."}] c:["$","section",null,{"className":"mx-auto mt-12 max-w-6xl","children":[["$","div",null,{"className":"mb-6 flex items-center justify-between","children":[["$","h2",null,{"className":"rounded-xl border border-ink-200 bg-ink-50 px-4 py-2 font-brand text-xl text-ink-700","children":"Produits & modules Kaspersky"}],["$","$L9",null,{"href":"/contact","className":"text-sm text-ink-700 hover:underline","children":"Obtenir une proposition →"}]]}],["$","div",null,{"className":"grid gap-6 sm:grid-cols-2 lg:grid-cols-3","children":[["$","article","Kaspersky Endpoint Security for Business",{"className":"group rounded-2xl border border-ink-100 bg-white p-4 shadow-sm transition hover:shadow-md","children":[["$","div",null,{"className":"relative aspect-[16/9] w-full overflow-hidden rounded-xl bg-ink-50","children":["$","$L8",null,{"src":"/partners/kaspersky/products/endpoint-security.png","alt":"Kaspersky Endpoint Security for Business","fill":true,"className":"object-contain p-4 transition group-hover:scale-[1.02]"}]}],["$","h3",null,{"className":"mt-4 text-lg font-semibold text-ink-700","children":"Kaspersky Endpoint Security for Business"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Protection postes de travail & serveurs (Windows/Linux/macOS), prévention des rançongiciels, contrôle périphériques et applications."}],["$","div",null,{"className":"mt-3 flex flex-wrap gap-2","children":[["$","span","Endpoint",{"className":"rounded-full border border-ink-100 bg-ink-50 px-2.5 py-1 text-xs text-ink-700","children":"Endpoint"}],["$","span","Ransomware",{"className":"rounded-full border border-ink-100 bg-ink-50 px-2.5 py-1 text-xs text-ink-700","children":"Ransomware"}],["$","span","Policy",{"className":"rounded-full border border-ink-100 bg-ink-50 px-2.5 py-1 text-xs text-ink-700","children":"Policy"}]]}],null]}],["$","article","Kaspersky EDR / XDR",{"className":"group rounded-2xl border border-ink-100 bg-white p-4 shadow-sm transition hover:shadow-md","children":[["$","div",null,{"className":"relative aspect-[16/9] w-full overflow-hidden rounded-xl bg-ink-50","children":["$","$L8",null,{"src":"/partners/kaspersky/products/edr-xdr.png","alt":"Kaspersky EDR / XDR","fill":true,"className":"object-contain p-4 transition group-hover:scale-[1.02]"}]}],["$","h3",null,{"className":"mt-4 text-lg font-semibold text-ink-700","children":"Kaspersky EDR / XDR"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Détection & réponse avancées, corrélation multi-vecteurs, hunting, playbooks et réponse automatisée."}],["$","div",null,{"className":"mt-3 flex flex-wrap gap-2","children":[["$","span","EDR",{"className":"rounded-full border border-ink-100 bg-ink-50 px-2.5 py-1 text-xs text-ink-700","children":"EDR"}],["$","span","XDR",{"className":"rounded-full border border-ink-100 bg-ink-50 px-2.5 py-1 text-xs text-ink-700","children":"XDR"}],["$","span","Automation",{"className":"rounded-full border border-ink-100 bg-ink-50 px-2.5 py-1 text-xs text-ink-700","children":"Automation"}]]}],null]}],["$","article","Kaspersky MDR",{"className":"group rounded-2xl border border-ink-100 bg-white p-4 shadow-sm transition hover:shadow-md","children":[["$","div",null,{"className":"relative aspect-[16/9] w-full overflow-hidden rounded-xl bg-ink-50","children":["$","$L8",null,{"src":"/partners/kaspersky/products/mdr.png","alt":"Kaspersky MDR","fill":true,"className":"object-contain p-4 transition group-hover:scale-[1.02]"}]}],["$","h3",null,{"className":"mt-4 text-lg font-semibold text-ink-700","children":"Kaspersky MDR"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Service managé 24/7 par des analystes SOC pour investigation, containment et remédiation."}],["$","div",null,{"className":"mt-3 flex flex-wrap gap-2","children":[["$","span","MDR",{"className":"rounded-full border border-ink-100 bg-ink-50 px-2.5 py-1 text-xs text-ink-700","children":"MDR"}],"$L13"]}],null]}],"$L14","$L15","$L16"]}]]}] d:["$","section",null,{"className":"mx-auto mt-12 max-w-6xl","children":["$","$L17",null,{}]}] e:["$","section",null,{"className":"mx-auto mt-12 max-w-6xl","children":[["$","h2",null,{"className":"rounded-xl border border-ink-200 bg-ink-50 px-4 py-2 font-brand text-xl text-ink-700","children":"Vidéos Kaspersky"}],["$","div",null,{"className":"mt-6 grid gap-6 md:grid-cols-2","children":[["$","div","Kaspersky Enterprise Cybersecurity",{"className":"overflow-hidden rounded-2xl border border-ink-100 bg-white shadow-sm","children":[["$","div",null,{"className":"aspect-video w-full","children":["$","iframe",null,{"className":"h-full w-full","src":"https://www.youtube.com/embed/a2dr5G_psGk","title":"Kaspersky Enterprise Cybersecurity","loading":"lazy","allow":"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share","allowFullScreen":true}]}],["$","div",null,{"className":"p-4","children":["$","p",null,{"className":"text-sm font-medium text-ink-700","children":"Kaspersky Enterprise Cybersecurity"}]}]]}],["$","div","Kaspersky XDR",{"className":"overflow-hidden rounded-2xl border border-ink-100 bg-white shadow-sm","children":[["$","div",null,{"className":"aspect-video w-full","children":["$","iframe",null,{"className":"h-full w-full","src":"https://www.youtube.com/embed/WbwhMmUm48k","title":"Kaspersky XDR","loading":"lazy","allow":"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share","allowFullScreen":true}]}],["$","div",null,{"className":"p-4","children":["$","p",null,{"className":"text-sm font-medium text-ink-700","children":"Kaspersky XDR"}]}]]}],["$","div","Kaspersky MDR",{"className":"overflow-hidden rounded-2xl border border-ink-100 bg-white shadow-sm","children":[["$","div",null,{"className":"aspect-video w-full","children":["$","iframe",null,{"className":"h-full w-full","src":"https://www.youtube.com/embed/p0IczReyYeE","title":"Kaspersky MDR","loading":"lazy","allow":"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share","allowFullScreen":true}]}],["$","div",null,{"className":"p-4","children":["$","p",null,{"className":"text-sm font-medium text-ink-700","children":"Kaspersky MDR"}]}]]}],["$","div","Kaspersky Security Awareness Training",{"className":"overflow-hidden rounded-2xl border border-ink-100 bg-white shadow-sm","children":[["$","div",null,{"className":"aspect-video w-full","children":["$","iframe",null,{"className":"h-full w-full","src":"https://www.youtube.com/embed/Le53hUfjAoc","title":"Kaspersky Security Awareness Training","loading":"lazy","allow":"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share","allowFullScreen":true}]}],["$","div",null,{"className":"p-4","children":["$","p",null,{"className":"text-sm font-medium text-ink-700","children":"Kaspersky Security Awareness Training"}]}]]}]]}]]}] f:["$","section",null,{"className":"mx-auto my-12 max-w-6xl","children":["$","div",null,{"className":"rounded-2xl bg-gradient-to-br from-ink-800 to-ink-900 p-6 text-white md:p-10","children":[["$","h3",null,{"className":"text-xl font-semibold","children":"Un projet Kaspersky à lancer ?"}],["$","p",null,{"className":"mt-2 max-w-3xl text-white/90","children":"Audit rapide, déploiement piloté, intégration SOC & supervision continue. Nos équipes opèrent au Maroc, en Tunisie et en Afrique avec des SLA adaptés à vos enjeux."}],["$","div",null,{"className":"mt-5 flex flex-wrap gap-3","children":[["$","$L9",null,{"href":"/contact","className":"rounded-xl bg-white px-5 py-2.5 text-ink-800","children":"Parler à un expert"}],["$","$L9",null,{"href":"/services/cybersecurite","className":"rounded-xl border border-white/30 px-5 py-2.5 text-white","children":"Voir notre offre Cybersécurité"}]]}]]}]}] 10:["$","$L18",null,{"children":["$L19",["$","$L1a",null,{"promise":"$@1b"}]]}] 11:["$","$1","h",{"children":[null,[["$","$L1c",null,{"children":"$L1d"}],null],["$","$L1e",null,{"children":["$","div",null,{"hidden":true,"children":["$","$1f",null,{"fallback":null,"children":"$L20"}]}]}]]}] 13:["$","span","SOC 24/7",{"className":"rounded-full border border-ink-100 bg-ink-50 px-2.5 py-1 text-xs text-ink-700","children":"SOC 24/7"}] 14:["$","article","Hybrid Cloud Security",{"className":"group rounded-2xl border border-ink-100 bg-white p-4 shadow-sm transition hover:shadow-md","children":[["$","div",null,{"className":"relative aspect-[16/9] w-full overflow-hidden rounded-xl bg-ink-50","children":["$","$L8",null,{"src":"/partners/kaspersky/products/hybrid-cloud.png","alt":"Hybrid Cloud Security","fill":true,"className":"object-contain p-4 transition group-hover:scale-[1.02]"}]}],["$","h3",null,{"className":"mt-4 text-lg font-semibold text-ink-700","children":"Hybrid Cloud Security"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Sécurisation des charges VMware, Hyper-V, KVM, Kubernetes & clouds publics, scans sans agent, micro-segmentation."}],["$","div",null,{"className":"mt-3 flex flex-wrap gap-2","children":[["$","span","Cloud",{"className":"rounded-full border border-ink-100 bg-ink-50 px-2.5 py-1 text-xs text-ink-700","children":"Cloud"}],["$","span","VM",{"className":"rounded-full border border-ink-100 bg-ink-50 px-2.5 py-1 text-xs text-ink-700","children":"VM"}],["$","span","K8s",{"className":"rounded-full border border-ink-100 bg-ink-50 px-2.5 py-1 text-xs text-ink-700","children":"K8s"}]]}],null]}] 15:["$","article","Mail & Collaboration Security",{"className":"group rounded-2xl border border-ink-100 bg-white p-4 shadow-sm transition hover:shadow-md","children":[["$","div",null,{"className":"relative aspect-[16/9] w-full overflow-hidden rounded-xl bg-ink-50","children":["$","$L8",null,{"src":"/partners/kaspersky/products/mail.png","alt":"Mail & Collaboration Security","fill":true,"className":"object-contain p-4 transition group-hover:scale-[1.02]"}]}],["$","h3",null,{"className":"mt-4 text-lg font-semibold text-ink-700","children":"Mail & Collaboration Security"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Protection M365/Exchange/SharePoint/Teams contre phishing, malware & BEC avec sandboxing."}],["$","div",null,{"className":"mt-3 flex flex-wrap gap-2","children":[["$","span","Email",{"className":"rounded-full border border-ink-100 bg-ink-50 px-2.5 py-1 text-xs text-ink-700","children":"Email"}],["$","span","Sandbox",{"className":"rounded-full border border-ink-100 bg-ink-50 px-2.5 py-1 text-xs text-ink-700","children":"Sandbox"}]]}],null]}] 16:["$","article","KUMA (SIEM)",{"className":"group rounded-2xl border border-ink-100 bg-white p-4 shadow-sm transition hover:shadow-md","children":[["$","div",null,{"className":"relative aspect-[16/9] w-full overflow-hidden rounded-xl bg-ink-50","children":["$","$L8",null,{"src":"/partners/kaspersky/products/kuma.png","alt":"KUMA (SIEM)","fill":true,"className":"object-contain p-4 transition group-hover:scale-[1.02]"}]}],["$","h3",null,{"className":"mt-4 text-lg font-semibold text-ink-700","children":"KUMA (SIEM)"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Collecte, corrélation & alerting temps réel, tableaux de bord de conformité et intégration SOAR."}],["$","div",null,{"className":"mt-3 flex flex-wrap gap-2","children":[["$","span","SIEM",{"className":"rounded-full border border-ink-100 bg-ink-50 px-2.5 py-1 text-xs text-ink-700","children":"SIEM"}],["$","span","SOAR",{"className":"rounded-full border border-ink-100 bg-ink-50 px-2.5 py-1 text-xs text-ink-700","children":"SOAR"}]]}],null]}] 1d:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}],["$","meta","2",{"name":"theme-color","media":"(prefers-color-scheme: light)","content":"#1f84ff"}],["$","meta","3",{"name":"theme-color","media":"(prefers-color-scheme: dark)","content":"#1f84ff"}],["$","meta","4",{"name":"color-scheme","content":"light dark"}]] 19:null 21:I[622,[],"IconMark"] 1b:{"metadata":[["$","title","0",{"children":"Kaspersky – Sécurité Endpoint, EDR/XDR & SOC | NewTechIT Maroc"}],["$","meta","1",{"name":"description","content":"Suite Kaspersky : Endpoint Security, EDR/MDR, XDR, Hybrid Cloud, Mail Security, KUMA (SIEM) et Security Center. Intégration, durcissement et support par NewTechIT au Maroc, en Tunisie et en Afrique."}],["$","link","2",{"rel":"manifest","href":"/site.webmanifest","crossOrigin":"$undefined"}],["$","meta","3",{"name":"robots","content":"index, follow"}],["$","meta","4",{"name":"googlebot","content":"index, follow, max-video-preview:-1, max-image-preview:large, max-snippet:-1"}],["$","link","5",{"rel":"canonical","href":"https://www.newtechit.ma/partenaires/kaspersky"}],["$","meta","6",{"property":"og:title","content":"Kaspersky – Sécurité Endpoint, EDR/XDR & SOC | NewTechIT Maroc"}],["$","meta","7",{"property":"og:description","content":"Kaspersky Endpoint Security, EDR/XDR, MDR, Hybrid Cloud, Mail Security, KUMA (SIEM) – intégration, SOC et services managés par NewTechIT."}],["$","meta","8",{"property":"og:url","content":"https://www.newtechit.ma/partenaires/kaspersky"}],["$","meta","9",{"property":"og:image","content":"https://www.newtechit.ma/partners/kaspersky/kaspersky-og.jpg"}],["$","meta","10",{"property":"og:type","content":"article"}],["$","meta","11",{"name":"twitter:card","content":"summary_large_image"}],["$","meta","12",{"name":"twitter:title","content":"Kaspersky – Sécurité Endpoint, EDR/XDR & SOC | NewTechIT"}],["$","meta","13",{"name":"twitter:description","content":"NewTechIT intègre et opère les solutions Kaspersky pour une protection complète des endpoints, serveurs, clouds et messageries."}],["$","meta","14",{"name":"twitter:image","content":"https://www.newtechit.ma/partners/kaspersky/kaspersky-og.jpg"}],["$","link","15",{"rel":"icon","href":"/favicon.ico"}],["$","link","16",{"rel":"apple-touch-icon","href":"/apple-touch-icon.png"}],["$","$L21","17",{}]],"error":null,"digest":"$undefined"} 20:"$1b:metadata"