1:"$Sreact.fragment" 2:I[1558,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 3:I[9766,[],""] 4:I[8924,[],""] 5:I[635,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 6:I[2659,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 7:I[3734,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","7177","static/chunks/app/layout-89ff635a24a088d7.js"],"default"] 8:I[1356,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","8049","static/chunks/app/partenaires/searchinform/page-7fd526776bbcfd23.js"],"Image"] 9:I[2619,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","8049","static/chunks/app/partenaires/searchinform/page-7fd526776bbcfd23.js"],""] 15:I[7150,[],""] :HL["/_next/static/css/37ed598c858eca7c.css","style"] 0:{"P":null,"b":"VJGL_Iz-oLBf86TGKroGj","p":"","c":["","partenaires","searchinform"],"i":false,"f":[[["",{"children":["partenaires",{"children":["searchinform",{"children":["__PAGE__",{}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/37ed598c858eca7c.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"fr","children":["$","body",null,{"className":"__className_f367f3 __variable_dc381d font-sans antialiased","children":[["$","$L2",null,{}],["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[["$","main",null,{"className":"mx-auto max-w-2xl px-6 py-24 text-center","children":[["$","h1",null,{"className":"text-3xl font-bold","children":"Page introuvable"}],["$","a",null,{"href":"/","className":"mt-6 inline-block rounded-xl bg-black px-4 py-2 text-white","children":"Retour à l’accueil"}]]}],[]],"forbidden":"$undefined","unauthorized":"$undefined"}],["$","$L5",null,{}],["$","$L6",null,{}],["$","$L7",null,{}]]}]}]]}],{"children":["partenaires",["$","$1","c",{"children":[null,["$","html",null,{"lang":"en","children":["$","body",null,{"children":["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]}]}]]}],{"children":["searchinform",["$","$1","c",{"children":[null,["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","main",null,{"className":"bg-white","children":[["$","section",null,{"className":"px-6 py-16 md:px-10 lg:px-16","children":["$","div",null,{"className":"mx-auto grid max-w-6xl items-center gap-10 lg:grid-cols-2","children":[["$","div",null,{"children":[["$","div",null,{"className":"mb-4 flex items-center gap-3","children":[["$","$L8",null,{"src":"/partners/searchinform/logo-si.png","alt":"SearchInform","width":160,"height":48}],["$","span",null,{"className":"rounded-full border border-ink-200 bg-ink-50 px-3 py-1 text-xs text-ink-700","children":"Partenaire & Intégrateur"}]]}],["$","h1",null,{"className":"font-brand text-3xl md:text-4xl text-ink-900 font-semibold tracking-tight","children":"SearchInform — DLP, Insider Risk & Audit de données"}],["$","p",null,{"className":"text-ink-700 leading-relaxed max-w-3xl mt-5","children":"Empêchez les fuites de données, détectez les comportements à risque et facilitez vos audits de conformité. NewTechIT conçoit et opère la solution SearchInform pour adapter les politiques à votre activité (finance, santé, industrie, services…)."}],["$","div",null,{"className":"mt-8 flex flex-wrap gap-3","children":[["$","span",null,{"className":"inline-flex items-center rounded-full bg-ink-100 px-3 py-1 text-sm text-ink-800","children":"Prévention des fuites (DLP)"}],["$","span",null,{"className":"inline-flex items-center rounded-full bg-ink-100 px-3 py-1 text-sm text-ink-800","children":"Insider Threat / UEBA"}],["$","span",null,{"className":"inline-flex items-center rounded-full bg-ink-100 px-3 py-1 text-sm text-ink-800","children":"File Audit & Compliance"}]]}],["$","div",null,{"className":"mt-8 flex gap-4","children":[["$","$L9",null,{"href":"#devis","className":"inline-flex items-center rounded-xl bg-ink-900 px-5 py-3 text-sm font-medium text-white shadow-sm hover:opacity-90","children":"Demander une démo"}],["$","$L9",null,{"href":"/services/cybersecurite","className":"inline-flex items-center rounded-xl border border-ink-200 bg-white px-5 py-3 text-sm font-medium text-ink-800 hover:bg-ink-50","children":"Nos services cybersécurité"}]]}]]}],["$","div",null,{"className":"relative aspect-[16/10] w-full","children":["$","$L8",null,{"src":"/partners/searchinform/si-hero.jpg","alt":"SearchInform DLP & Insider Risk","fill":true,"className":"rounded-2xl border border-ink-200 object-cover shadow-sm","priority":true}]}]]}]}],["$","section",null,{"className":"px-6 pb-6 md:px-10 lg:px-16","children":["$","div",null,{"className":"mx-auto grid max-w-6xl gap-6 md:grid-cols-2 lg:grid-cols-4","children":[["$","div","Couverture complète des canaux",{"className":"rounded-2xl border border-ink-200 bg-white p-6 shadow-sm","children":["$La","$Lb"]}],"$Lc","$Ld","$Le"]}]}],"$Lf","$L10","$L11","$L12"]}],null,"$L13"]}],{},null,false]},null,false]},null,false]},null,false],"$L14",false]],"m":"$undefined","G":["$15",[]],"s":false,"S":true} 19:I[1020,["1356","static/chunks/1356-fc9ef43fe4084835.js","2619","static/chunks/2619-38012e79151e370a.js","8049","static/chunks/app/partenaires/searchinform/page-7fd526776bbcfd23.js"],"default"] 1a:I[4431,[],"OutletBoundary"] 1c:I[5278,[],"AsyncMetadataOutlet"] 1e:I[4431,[],"ViewportBoundary"] 20:I[4431,[],"MetadataBoundary"] 21:"$Sreact.suspense" a:["$","div",null,{"className":"font-semibold text-ink-900","children":"Couverture complète des canaux"}] b:["$","p",null,{"className":"mt-2 text-sm leading-relaxed text-ink-600","children":"Endpoints, email, web, périphériques, impressions : des politiques alignées sur vos règles métiers."}] c:["$","div","Analytique & contexte",{"className":"rounded-2xl border border-ink-200 bg-white p-6 shadow-sm","children":[["$","div",null,{"className":"font-semibold text-ink-900","children":"Analytique & contexte"}],["$","p",null,{"className":"mt-2 text-sm leading-relaxed text-ink-600","children":"UEBA et corrélations pour comprendre le « qui / quoi / quand » et prioriser les incidents critiques."}]]}] d:["$","div","Déploiement maîtrisé",{"className":"rounded-2xl border border-ink-200 bg-white p-6 shadow-sm","children":[["$","div",null,{"className":"font-semibold text-ink-900","children":"Déploiement maîtrisé"}],["$","p",null,{"className":"mt-2 text-sm leading-relaxed text-ink-600","children":"Design d’architecture, pilotes sur périmètres restreints, montée en charge progressive."}]]}] e:["$","div","Services managés",{"className":"rounded-2xl border border-ink-200 bg-white p-6 shadow-sm","children":[["$","div",null,{"className":"font-semibold text-ink-900","children":"Services managés"}],["$","p",null,{"className":"mt-2 text-sm leading-relaxed text-ink-600","children":"Supervision, tuning de politiques, reporting mensuel et accompagnement audit."}]]}] f:["$","section",null,{"className":"bg-ink-25/60 px-6 py-16 md:px-10 lg:px-16","children":["$","div",null,{"className":"mx-auto max-w-6xl","children":[["$","h2",null,{"className":"font-brand text-2xl md:text-3xl text-ink-900 font-semibold","children":"Modules principaux"}],["$","p",null,{"className":"mt-3 max-w-3xl text-ink-700","children":"Construisez votre trajectoire : démarrez par le DLP, ajoutez l’UEBA, puis étendez aux audits de données et au reporting conformité."}],["$","div",null,{"className":"mt-10 grid gap-6 md:grid-cols-2 lg:grid-cols-4","children":[["$","div","Data Loss Prevention (DLP)",{"className":"rounded-2xl border border-ink-200 bg-white shadow-sm transition hover:shadow-md","children":[["$","div",null,{"className":"relative h-40 w-full","children":["$","$L8",null,{"src":"/partners/searchinform/dlp.png","alt":"Data Loss Prevention (DLP)","fill":true,"className":"object-contain p-5"}]}],["$","div",null,{"className":"px-5 pb-5","children":[["$","div",null,{"className":"flex items-center justify-between","children":[["$","h3",null,{"className":"font-brand text-lg text-ink-900","children":"Data Loss Prevention (DLP)"}],["$","span",null,{"className":"ml-2 rounded-full bg-ink-100 px-2 py-1 text-xs text-ink-800","children":"Cœur DLP"}]]}],["$","p",null,{"className":"mt-2 text-sm text-ink-700","children":"Prévention des fuites de données sur endpoints, email, web et périphériques. Politiques contextuelles, règles de contenu, workflow d’incident."}],["$","ul",null,{"className":"mt-3 list-disc space-y-1 pl-5 text-sm text-ink-700","children":[["$","li","Contrôle canaux (USB, email, web, impression)",{"children":"Contrôle canaux (USB, email, web, impression)"}],["$","li","Moteurs de détection (mots-clés, dictionnaires, empreintes)",{"children":"Moteurs de détection (mots-clés, dictionnaires, empreintes)"}],["$","li","Enquêtes et preuves (captures, enregistrements, horodatage)",{"children":"Enquêtes et preuves (captures, enregistrements, horodatage)"}]]}],"$undefined"]}]]}],["$","div","Insider Risk & UEBA",{"className":"rounded-2xl border border-ink-200 bg-white shadow-sm transition hover:shadow-md","children":[["$","div",null,{"className":"relative h-40 w-full","children":["$","$L8",null,{"src":"/partners/searchinform/insider-risk.png","alt":"Insider Risk & UEBA","fill":true,"className":"object-contain p-5"}]}],["$","div",null,{"className":"px-5 pb-5","children":[["$","div",null,{"className":"flex items-center justify-between","children":[["$","h3",null,{"className":"font-brand text-lg text-ink-900","children":"Insider Risk & UEBA"}],["$","span",null,{"className":"ml-2 rounded-full bg-ink-100 px-2 py-1 text-xs text-ink-800","children":"UEBA"}]]}],["$","p",null,{"className":"mt-2 text-sm text-ink-700","children":"Détection des comportements anormaux (UEBA), visibilité sur les activités sensibles, indicateurs de risque et alertes corrélées."}],["$","ul",null,{"className":"mt-3 list-disc space-y-1 pl-5 text-sm text-ink-700","children":[["$","li","Scores de risque utilisateurs",{"children":"Scores de risque utilisateurs"}],["$","li","Scénarios (exfiltration, vol IP, fraude)",{"children":"Scénarios (exfiltration, vol IP, fraude)"}],["$","li","Tableaux de bord SOC/Direction",{"children":"Tableaux de bord SOC/Direction"}]]}],"$undefined"]}]]}],["$","div","File Audit & Data Discovery",{"className":"rounded-2xl border border-ink-200 bg-white shadow-sm transition hover:shadow-md","children":[["$","div",null,{"className":"relative h-40 w-full","children":["$","$L8",null,{"src":"/partners/searchinform/file-audit.jpg","alt":"File Audit & Data Discovery","fill":true,"className":"object-contain p-5"}]}],["$","div",null,{"className":"px-5 pb-5","children":[["$","div",null,{"className":"flex items-center justify-between","children":[["$","h3",null,{"className":"font-brand text-lg text-ink-900","children":"File Audit & Data Discovery"}],["$","span",null,{"className":"ml-2 rounded-full bg-ink-100 px-2 py-1 text-xs text-ink-800","children":"Audit"}]]}],["$","p",null,{"className":"mt-2 text-sm text-ink-700","children":"Cartographie et audit des données sur partages, serveurs et NAS. Repérez données sensibles, accès excessifs et dérives de permissions."}],"$L16","$undefined"]}]]}],"$L17"]}],"$L18"]}]}] 10:["$","section",null,{"className":"px-6 py-16 md:px-10 lg:px-16","children":[["$","div",null,{"className":"mx-auto grid max-w-6xl gap-6 lg:grid-cols-3","children":[["$","div",null,{"className":"rounded-2xl border border-ink-200 bg-white p-6 shadow-sm","children":[["$","div",null,{"className":"font-brand text-xl text-ink-900","children":"01 • Assessment"}],["$","p",null,{"className":"mt-2 text-sm text-ink-700","children":"Inventaire des flux, données sensibles et cas d’usage. Définition des politiques initiales et périmètres pilotes."}]]}],["$","div",null,{"className":"rounded-2xl border border-ink-200 bg-white p-6 shadow-sm","children":[["$","div",null,{"className":"font-brand text-xl text-ink-900","children":"02 • Pilotage"}],["$","p",null,{"className":"mt-2 text-sm text-ink-700","children":"Déploiement limité, ajustements (faux positifs), intégration annuaires, connecteurs et tableaux de bord."}]]}],["$","div",null,{"className":"rounded-2xl border border-ink-200 bg-white p-6 shadow-sm","children":[["$","div",null,{"className":"font-brand text-xl text-ink-900","children":"03 • Run & Amélioration"}],["$","p",null,{"className":"mt-2 text-sm text-ink-700","children":"Passage en production, reporting périodique, revue des politiques, accompagnement audit et conformité."}]]}]]}],["$","div",null,{"className":"mx-auto mt-10 flex max-w-6xl flex-wrap gap-4","children":[["$","$L9",null,{"href":"#devis","className":"inline-flex items-center rounded-xl bg-ink-900 px-5 py-3 text-sm font-medium text-white shadow-sm hover:opacity-90","children":"Parler à un expert"}],["$","$L9",null,{"href":"/services/backup-pra","className":"inline-flex items-center rounded-xl border border-ink-200 bg-white px-5 py-3 text-sm font-medium text-ink-800 hover:bg-ink-50","children":"Voir aussi : PRA & sauvegarde"}]]}]]}] 11:["$","section",null,{"id":"devis","className":"px-6 pb-20 md:px-10 lg:px-16","children":["$","div",null,{"className":"mx-auto max-w-5xl","children":["$","$L19",null,{}]}]}] 12:["$","section",null,{"className":"bg-ink-25/60 px-6 pb-24 md:px-10 lg:px-16","children":["$","div",null,{"className":"mx-auto max-w-6xl","children":[["$","h2",null,{"className":"font-brand text-2xl md:text-3xl text-ink-900 font-semibold","children":"FAQ SearchInform"}],["$","div",null,{"className":"mt-6 grid gap-6 md:grid-cols-2","children":[["$","div",null,{"className":"rounded-2xl border border-ink-200 bg-white p-6 shadow-sm","children":[["$","div",null,{"className":"font-semibold text-ink-900","children":"Le DLP peut-il fonctionner sans perturber les utilisateurs ?"}],["$","p",null,{"className":"mt-2 text-sm text-ink-700","children":"Oui. On démarre souvent en mode « monitor » pour ajuster les règles. Les blocages sont activés progressivement sur les scénarios validés."}]]}],["$","div",null,{"className":"rounded-2xl border border-ink-200 bg-white p-6 shadow-sm","children":[["$","div",null,{"className":"font-semibold text-ink-900","children":"Quelles intégrations sont possibles ?"}],["$","p",null,{"className":"mt-2 text-sm text-ink-700","children":"Annuaire (AD), SIEM/SOC, messagerie, proxys, MDM/EMM… Nous alignons l’architecture à votre contexte (on-prem, cloud ou hybride)."}]]}],["$","div",null,{"className":"rounded-2xl border border-ink-200 bg-white p-6 shadow-sm","children":[["$","div",null,{"className":"font-semibold text-ink-900","children":"Comment limiter les faux positifs ?"}],["$","p",null,{"className":"mt-2 text-sm text-ink-700","children":"En combinant plusieurs critères (contenu + contexte + canal) et en itérant avec vos métiers pour affiner les politiques."}]]}],["$","div",null,{"className":"rounded-2xl border border-ink-200 bg-white p-6 shadow-sm","children":[["$","div",null,{"className":"font-semibold text-ink-900","children":"Offrez-vous un service managé DLP ?"}],["$","p",null,{"className":"mt-2 text-sm text-ink-700","children":"Oui. NewTechIT peut opérer, tuner et reporter mensuellement sur vos indicateurs clés (incidents, tendances, conformité)."}]]}]]}]]}]}] 13:["$","$L1a",null,{"children":["$L1b",["$","$L1c",null,{"promise":"$@1d"}]]}] 14:["$","$1","h",{"children":[null,[["$","$L1e",null,{"children":"$L1f"}],null],["$","$L20",null,{"children":["$","div",null,{"hidden":true,"children":["$","$21",null,{"fallback":null,"children":"$L22"}]}]}]]}] 16:["$","ul",null,{"className":"mt-3 list-disc space-y-1 pl-5 text-sm text-ink-700","children":[["$","li","Inventaire & classification",{"children":"Inventaire & classification"}],["$","li","Analyse des droits effectifs",{"children":"Analyse des droits effectifs"}],["$","li","Rapports conformité (ISO 27001, RGPD)",{"children":"Rapports conformité (ISO 27001, RGPD)"}]]}] 17:["$","div","Compliance & Reporting",{"className":"rounded-2xl border border-ink-200 bg-white shadow-sm transition hover:shadow-md","children":[["$","div",null,{"className":"relative h-40 w-full","children":["$","$L8",null,{"src":"/partners/searchinform/reporting.jpg","alt":"Compliance & Reporting","fill":true,"className":"object-contain p-5"}]}],["$","div",null,{"className":"px-5 pb-5","children":[["$","div",null,{"className":"flex items-center justify-between","children":[["$","h3",null,{"className":"font-brand text-lg text-ink-900","children":"Compliance & Reporting"}],["$","span",null,{"className":"ml-2 rounded-full bg-ink-100 px-2 py-1 text-xs text-ink-800","children":"Gouvernance"}]]}],["$","p",null,{"className":"mt-2 text-sm text-ink-700","children":"Rapports prêts à l’emploi pour conformité et audits internes. Traçabilité, SLA d’investigation et conservation des preuves."}],["$","ul",null,{"className":"mt-3 list-disc space-y-1 pl-5 text-sm text-ink-700","children":[["$","li","Rapports périodiques & ad hoc",{"children":"Rapports périodiques & ad hoc"}],["$","li","Exports PDF/CSV",{"children":"Exports PDF/CSV"}],["$","li","Journalisation centralisée",{"children":"Journalisation centralisée"}]]}],"$undefined"]}]]}] 18:["$","div",null,{"className":"mt-12 rounded-2xl border border-ink-200 bg-gradient-to-r from-ink-50 to-white p-6","children":["$","p",null,{"className":"text-ink-800","children":[["$","strong",null,{"children":"NewTechIT"}]," accompagne votre projet SearchInform : cadrage ISO 27001, politiques DLP adaptées au métier, pilotes, intégration SIEM/SOC, formation & transfert de compétences, et services managés (MDR/DLP)."]}]}] 1f:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}],["$","meta","2",{"name":"theme-color","media":"(prefers-color-scheme: light)","content":"#1f84ff"}],["$","meta","3",{"name":"theme-color","media":"(prefers-color-scheme: dark)","content":"#1f84ff"}],["$","meta","4",{"name":"color-scheme","content":"light dark"}]] 1b:null 23:I[622,[],"IconMark"] 1d:{"metadata":[["$","title","0",{"children":"SearchInform – DLP & Insider Threat | NewTechIT Maroc"}],["$","meta","1",{"name":"description","content":"SearchInform : Data Loss Prevention (DLP), supervision des risques internes, audit des fichiers et conformité. Intégration, déploiement et services managés par NewTechIT."}],["$","link","2",{"rel":"manifest","href":"/site.webmanifest","crossOrigin":"$undefined"}],["$","meta","3",{"name":"robots","content":"index, follow"}],["$","meta","4",{"name":"googlebot","content":"index, follow, max-video-preview:-1, max-image-preview:large, max-snippet:-1"}],["$","link","5",{"rel":"canonical","href":"https://www.newtechit.ma"}],["$","link","6",{"rel":"alternate","hrefLang":"fr","href":"https://www.newtechit.ma"}],["$","link","7",{"rel":"alternate","hrefLang":"en","href":"https://www.newtechit.ma/en"}],["$","link","8",{"rel":"alternate","hrefLang":"x-default","href":"https://www.newtechit.ma"}],["$","meta","9",{"property":"og:title","content":"SearchInform – DLP & Insider Threat | NewTechIT Maroc"}],["$","meta","10",{"property":"og:description","content":"Empêchez les fuites de données et maîtrisez les risques internes avec SearchInform (DLP, audit, analytics). NewTechIT accompagne l’intégration de bout en bout."}],["$","meta","11",{"property":"og:image","content":"https://www.newtechit.ma/partners/searchinform/si-hero.jpeg"}],["$","meta","12",{"name":"twitter:card","content":"summary_large_image"}],["$","meta","13",{"name":"twitter:title","content":"NewTechIT – Cybersécurité, Cloud, Veeam & Infogérance"}],["$","meta","14",{"name":"twitter:description","content":"Intégrateur IT au Maroc et en Tunisie : cybersécurité, sauvegarde Veeam, cloud, supervision et infogérance."}],["$","meta","15",{"name":"twitter:image","content":"https://www.newtechit.ma/images/og-default.jpg"}],["$","link","16",{"rel":"icon","href":"/favicon.ico"}],["$","link","17",{"rel":"apple-touch-icon","href":"/apple-touch-icon.png"}],["$","$L23","18",{}]],"error":null,"digest":"$undefined"} 22:"$1d:metadata"