1:"$Sreact.fragment" 2:I[1558,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 3:I[9766,[],""] 4:I[8924,[],""] 5:I[635,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 6:I[2659,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 7:I[3734,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 8:I[1356,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","4882","static/chunks/app/partenaires/paloalto/page-bdd99a2895ba46c4.js"],"Image"] 11:I[7150,[],""] :HL["/_next/static/css/37ed598c858eca7c.css","style"] 0:{"P":null,"b":"VJGL_Iz-oLBf86TGKroGj","p":"","c":["","partenaires","paloalto"],"i":false,"f":[[["",{"children":["partenaires",{"children":["paloalto",{"children":["__PAGE__",{}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/37ed598c858eca7c.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"fr","children":["$","body",null,{"className":"__className_f367f3 __variable_dc381d font-sans antialiased","children":[["$","$L2",null,{}],["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[["$","main",null,{"className":"mx-auto max-w-2xl px-6 py-24 text-center","children":[["$","h1",null,{"className":"text-3xl font-bold","children":"Page introuvable"}],["$","a",null,{"href":"/","className":"mt-6 inline-block rounded-xl bg-black px-4 py-2 text-white","children":"Retour à l’accueil"}]]}],[]],"forbidden":"$undefined","unauthorized":"$undefined"}],["$","$L5",null,{}],["$","$L6",null,{}],["$","$L7",null,{}]]}]}]]}],{"children":["partenaires",["$","$1","c",{"children":[null,["$","html",null,{"lang":"en","children":["$","body",null,{"children":["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]}]}]]}],{"children":["paloalto",["$","$1","c",{"children":[null,["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","main",null,{"className":"px-6 py-12 md:px-10 lg:px-16","children":[["$","section",null,{"className":"mx-auto max-w-6xl","children":["$","div",null,{"className":"grid grid-cols-1 items-center gap-8 md:grid-cols-2","children":[["$","div",null,{"children":[["$","div",null,{"className":"mb-4 inline-flex items-center gap-3 rounded-full border border-ink-200 px-3 py-1 text-sm text-ink-600","children":[["$","$L8",null,{"src":"/partners/paloalto/logo.png","alt":"Palo Alto Networks logo","width":28,"height":28}],"Partenaire • Intégration & Infogérance Sécurité"]}],["$","h1",null,{"className":"font-brand text-[clamp(28px,3.2vw,40px)] leading-tight text-ink-800","children":"Palo Alto Networks : NGFW, SASE & XDR pour une sécurité Zero-Trust"}],["$","p",null,{"className":"mt-4 text-ink-600","children":"NewTechIT conçoit et opère des architectures de sécurité basées sur Palo Alto Networks : pare-feu nouvelle génération (NGFW), SASE Prisma Access, Cortex XDR, sandboxing WildFire et gestion centralisée Panorama. Nos équipes accompagnent le design, le déploiement, le MCO 8×5/24×7 et l’intégration SOC."}],["$","div",null,{"className":"mt-6 flex flex-wrap gap-2","children":[["$","span","NGFW",{"className":"inline-flex items-center rounded-full border border-ink-200 px-3 py-1 text-sm text-ink-700","children":"NGFW"}],["$","span","SASE / Prisma Access",{"className":"inline-flex items-center rounded-full border border-ink-200 px-3 py-1 text-sm text-ink-700","children":"SASE / Prisma Access"}],["$","span","Cortex XDR",{"className":"inline-flex items-center rounded-full border border-ink-200 px-3 py-1 text-sm text-ink-700","children":"Cortex XDR"}],["$","span","WildFire",{"className":"inline-flex items-center rounded-full border border-ink-200 px-3 py-1 text-sm text-ink-700","children":"WildFire"}],["$","span","Panorama",{"className":"inline-flex items-center rounded-full border border-ink-200 px-3 py-1 text-sm text-ink-700","children":"Panorama"}],["$","span","GlobalProtect",{"className":"inline-flex items-center rounded-full border border-ink-200 px-3 py-1 text-sm text-ink-700","children":"GlobalProtect"}]]}]]}],["$","div",null,{"className":"relative","children":[["$","div",null,{"className":"relative overflow-hidden rounded-2xl border border-ink-200 shadow-sm","children":["$","$L8",null,{"src":"/partners/paloalto/hero.jpg","alt":"Palo Alto Networks NGFW & SASE","width":1280,"height":800,"className":"h-auto w-full object-cover","priority":true}]}],["$","div",null,{"className":"pointer-events-none absolute -right-4 -top-4 hidden h-24 w-24 rounded-full bg-primary/10 blur-2xl md:block"}]]}]]}]}],"$L9","$La","$Lb","$Lc","$Ld","$Le"]}],null,"$Lf"]}],{},null,false]},null,false]},null,false]},null,false],"$L10",false]],"m":"$undefined","G":["$11",[]],"s":false,"S":true} 12:I[669,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","4882","static/chunks/app/partenaires/paloalto/page-bdd99a2895ba46c4.js"],"default"] 13:I[2619,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","4882","static/chunks/app/partenaires/paloalto/page-bdd99a2895ba46c4.js"],""] 14:I[4431,[],"OutletBoundary"] 16:I[5278,[],"AsyncMetadataOutlet"] 18:I[4431,[],"ViewportBoundary"] 1a:I[4431,[],"MetadataBoundary"] 1b:"$Sreact.suspense" 9:["$","section",null,{"className":"mx-auto mt-14 max-w-6xl","children":[["$","h2",null,{"className":"font-brand text-2xl md:text-3xl tracking-wide text-ink-700","children":"Pourquoi choisir Palo Alto avec NewTechIT ?"}],["$","div",null,{"className":"mt-6 grid gap-4 md:grid-cols-2 lg:grid-cols-3","children":[["$","article","NGFW",{"className":"rounded-xl border border-ink-200 p-5 shadow-sm","children":[["$","h3",null,{"className":"text-ink-800","children":"NGFW"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Inspection L7, App-ID, User-ID, Threat Prevention & URL Filtering."}]]}],["$","article","SASE / Prisma Access",{"className":"rounded-xl border border-ink-200 p-5 shadow-sm","children":[["$","h3",null,{"className":"text-ink-800","children":"SASE / Prisma Access"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Sécurité convergée pour utilisateurs & sites, Zero Trust Network Access."}]]}],["$","article","Cortex XDR",{"className":"rounded-xl border border-ink-200 p-5 shadow-sm","children":[["$","h3",null,{"className":"text-ink-800","children":"Cortex XDR"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Détection & réponse étendues, corrélation multi-sources et automation."}]]}],["$","article","WildFire",{"className":"rounded-xl border border-ink-200 p-5 shadow-sm","children":[["$","h3",null,{"className":"text-ink-800","children":"WildFire"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Sandboxing cloud, analyse comportementale et protection 0-day."}]]}],["$","article","Panorama",{"className":"rounded-xl border border-ink-200 p-5 shadow-sm","children":[["$","h3",null,{"className":"text-ink-800","children":"Panorama"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Gestion centralisée des politiques & configuration multi-pare-feux."}]]}],["$","article","GlobalProtect",{"className":"rounded-xl border border-ink-200 p-5 shadow-sm","children":[["$","h3",null,{"className":"text-ink-800","children":"GlobalProtect"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"VPN/ZTNA pour utilisateurs nomades avec posture de sécurité."}]]}]]}]]}] a:["$","section",null,{"id":"produits","className":"mx-auto mt-16 max-w-6xl","children":[["$","h2",null,{"className":"font-brand text-2xl md:text-3xl tracking-wide text-ink-700","children":"Principaux produits & solutions"}],["$","div",null,{"className":"mt-6 grid gap-4 md:grid-cols-2 lg:grid-cols-3","children":[["$","article","Pare-feu NGFW (Hardware & VM-Series)",{"className":"rounded-2xl border border-ink-200 p-5 shadow-sm transition hover:shadow-md","children":[["$","h3",null,{"className":"text-ink-800","children":"Pare-feu NGFW (Hardware & VM-Series)"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"App-ID, User-ID, Content-ID, IPS/Anti-Malware, URL filtering, déchiffrement SSL/TLS, HA & clustering."}]]}],["$","article","Prisma Access (SASE)",{"className":"rounded-2xl border border-ink-200 p-5 shadow-sm transition hover:shadow-md","children":[["$","h3",null,{"className":"text-ink-800","children":"Prisma Access (SASE)"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Passerelle sécurisée cloud, SWG, CASB, ZTNA, FWaaS. Connectivité globale avec intégration SD-WAN."}]]}],["$","article","Cortex XDR",{"className":"rounded-2xl border border-ink-200 p-5 shadow-sm transition hover:shadow-md","children":[["$","h3",null,{"className":"text-ink-800","children":"Cortex XDR"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Prévention & EDR/XDR, télémétrie endpoint/network/cloud, hunting et playbooks d’investigation."}]]}],["$","article","WildFire",{"className":"rounded-2xl border border-ink-200 p-5 shadow-sm transition hover:shadow-md","children":[["$","h3",null,{"className":"text-ink-800","children":"WildFire"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Analyse dynamique (sandbox), signatures en temps réel, blocage des menaces 0-day et ransomware."}]]}],["$","article","Panorama",{"className":"rounded-2xl border border-ink-200 p-5 shadow-sm transition hover:shadow-md","children":[["$","h3",null,{"className":"text-ink-800","children":"Panorama"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Administration centralisée, templates & device-groups, policy-as-code et reporting conformité."}]]}],["$","article","GlobalProtect",{"className":"rounded-2xl border border-ink-200 p-5 shadow-sm transition hover:shadow-md","children":[["$","h3",null,{"className":"text-ink-800","children":"GlobalProtect"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Accès distant sécurisé, MFA/IdP, posture check, segmentation utilisateur et ZTNA."}]]}]]}]]}] b:["$","section",null,{"className":"mx-auto mt-16 max-w-6xl","children":["$","$L12",null,{}]}] c:["$","section",null,{"className":"mx-auto mt-16 max-w-6xl","children":["$","div",null,{"className":"grid items-center gap-8 md:grid-cols-2","children":[["$","div",null,{"children":[["$","h2",null,{"className":"font-brand text-2xl md:text-3xl tracking-wide text-ink-700","children":"Approche d’intégration & MCO"}],["$","ul",null,{"className":"mt-4 list-disc pl-5 text-ink-600","children":[["$","li",null,{"children":[["$","strong",null,{"children":"Audit & Design"}]," : inventaire, objectifs ZTNA, cartographie des flux, sizing NGFW/SASE."]}],["$","li",null,{"children":[["$","strong",null,{"children":"Déploiement"}]," : politiques App-ID/User-ID, profils de sécurité, HA, logging & SIEM."]}],["$","li",null,{"children":[["$","strong",null,{"children":"Intégration SOC"}]," : corrélation Cortex, alerting, playbooks et rapports conformité."]}],["$","li",null,{"children":[["$","strong",null,{"children":"MCO"}]," : mises à jour, durcissement, sauvegarde config, revues trimestrielles, SLA."]}]]}]]}],["$","div",null,{"children":["$","div",null,{"className":"overflow-hidden rounded-2xl border border-ink-200 shadow-sm","children":["$","$L8",null,{"src":"/partners/paloalto/integration.webp","alt":"Approche d’intégration Palo Alto par NewTechIT","width":1280,"height":800,"className":"h-auto w-full object-cover"}]}]}]]}]}] d:["$","section",null,{"id":"videos","className":"mx-auto mt-16 max-w-6xl","children":[["$","h2",null,{"className":"font-brand text-2xl md:text-3xl tracking-wide text-ink-700","children":"Découvrir en vidéo"}],["$","p",null,{"className":"mt-2 text-sm text-ink-600","children":"Intégrez ici vos vidéos officielles Palo Alto Networks (YouTube/Vimeo). Remplacez simplement les IDs dans les URLs ci-dessous si besoin."}],["$","div",null,{"className":"mt-6 grid gap-6 md:grid-cols-2","children":[["$","div",null,{"className":"relative w-full overflow-hidden rounded-xl border border-ink-200 shadow-sm","style":{"paddingTop":"56.25%"},"children":["$","iframe",null,{"className":"absolute left-0 top-0 h-full w-full","src":"https://www.youtube.com/embed/Fa0T1_o5njs","title":"Palo Alto Networks Advanced Threat Prevention","loading":"lazy","referrerPolicy":"strict-origin-when-cross-origin","allow":"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share","allowFullScreen":true}]}],["$","div",null,{"className":"relative w-full overflow-hidden rounded-xl border border-ink-200 shadow-sm","style":{"paddingTop":"56.25%"},"children":["$","iframe",null,{"className":"absolute left-0 top-0 h-full w-full","src":"https://www.youtube.com/embed/I3bfvcKs2uY","title":"PAIOps for NGFW by Palo Alto Networks","loading":"lazy","referrerPolicy":"strict-origin-when-cross-origin","allow":"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share","allowFullScreen":true}]}]]}]]}] e:["$","section",null,{"className":"mx-auto mt-16 max-w-6xl","children":["$","div",null,{"className":"rounded-2xl border border-ink-200 bg-gradient-to-br from-white to-ink-50 p-6 text-center shadow-sm","children":[["$","h3",null,{"className":"text-xl text-ink-800","children":"Un projet Palo Alto ? Parlons-en."}],["$","p",null,{"className":"mt-2 text-ink-600","children":"Audit express, étude d’architecture, migration NGFW, Prisma Access, XDR ou SOC : on s’occupe du design jusqu’au run."}],["$","div",null,{"className":"mt-4 inline-flex items-center gap-3","children":[["$","$L13",null,{"href":"/contact","className":"rounded-lg bg-primary px-4 py-2 text-white shadow hover:opacity-90","children":"Demander une consultation"}],["$","$L13",null,{"href":"/services/cybersecurite","className":"rounded-lg border border-ink-200 px-4 py-2 text-ink-700 hover:bg-ink-50","children":"Voir nos offres cybersécurité"}]]}]]}]}] f:["$","$L14",null,{"children":["$L15",["$","$L16",null,{"promise":"$@17"}]]}] 10:["$","$1","h",{"children":[null,[["$","$L18",null,{"children":"$L19"}],null],["$","$L1a",null,{"children":["$","div",null,{"hidden":true,"children":["$","$1b",null,{"fallback":null,"children":"$L1c"}]}]}]]}] 19:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}],["$","meta","2",{"name":"theme-color","media":"(prefers-color-scheme: light)","content":"#1f84ff"}],["$","meta","3",{"name":"theme-color","media":"(prefers-color-scheme: dark)","content":"#1f84ff"}],["$","meta","4",{"name":"color-scheme","content":"light dark"}]] 15:null 1d:I[622,[],"IconMark"] 17:{"metadata":[["$","title","0",{"children":"Palo Alto Networks – Partenaire & Intégrateur | NewTechIT"}],["$","meta","1",{"name":"description","content":"Pare-feu nouvelle génération, SASE Prisma Access, EDR/XDR Cortex, sandboxing WildFire, gestion centralisée Panorama. Intégration, MCO et SOC par NewTechIT."}],["$","link","2",{"rel":"manifest","href":"/site.webmanifest","crossOrigin":"$undefined"}],["$","meta","3",{"name":"robots","content":"index, follow"}],["$","meta","4",{"name":"googlebot","content":"index, follow, max-video-preview:-1, max-image-preview:large, max-snippet:-1"}],["$","link","5",{"rel":"canonical","href":"https://www.newtechit.ma"}],["$","link","6",{"rel":"alternate","hrefLang":"fr","href":"https://www.newtechit.ma"}],["$","link","7",{"rel":"alternate","hrefLang":"en","href":"https://www.newtechit.ma/en"}],["$","link","8",{"rel":"alternate","hrefLang":"x-default","href":"https://www.newtechit.ma"}],["$","meta","9",{"property":"og:title","content":"Palo Alto Networks – Partenaire & Intégrateur | NewTechIT"}],["$","meta","10",{"property":"og:description","content":"NGFW, SASE/Prisma, Cortex XDR, WildFire, Panorama. Déploiement, support et infogérance sécurité par NewTechIT."}],["$","meta","11",{"property":"og:image","content":"https://www.newtechit.ma/partners/paloalto/og-cover.jpg"}],["$","meta","12",{"name":"twitter:card","content":"summary_large_image"}],["$","meta","13",{"name":"twitter:title","content":"NewTechIT – Cybersécurité, Cloud, Veeam & Infogérance"}],["$","meta","14",{"name":"twitter:description","content":"Intégrateur IT au Maroc et en Tunisie : cybersécurité, sauvegarde Veeam, cloud, supervision et infogérance."}],["$","meta","15",{"name":"twitter:image","content":"https://www.newtechit.ma/images/og-default.jpg"}],["$","link","16",{"rel":"icon","href":"/favicon.ico"}],["$","link","17",{"rel":"apple-touch-icon","href":"/apple-touch-icon.png"}],["$","$L1d","18",{}]],"error":null,"digest":"$undefined"} 1c:"$17:metadata"