{"id":39084,"date":"2017-08-22T21:02:00","date_gmt":"2017-08-23T02:02:00","guid":{"rendered":"http:\/\/www.eagleeyenetworks.com\/analyses-securite\/"},"modified":"2021-04-22T09:27:29","modified_gmt":"2021-04-22T14:27:29","slug":"analyses-securite","status":"publish","type":"post","link":"https:\/\/www.een.com\/fr\/blog\/analyses-securite\/","title":{"rendered":"Analyses de S\u00e9curit\u00e9"},"content":{"rendered":"<p>Eagle Eye Networks a lanc\u00e9 des outils d&rsquo;analyse de Franchissement de Ligne et de D\u00e9tection d&rsquo;Intrusion pour le VMS de Cam\u00e9ras de S\u00e9curit\u00e9 Eagle Eye. Ces donn\u00e9es analytiques permettent d&rsquo;analyser les images de surveillance continuellement et en temps-r\u00e9el pour alerter les Clients Eagle Eye lorsque leur attention est requise.<\/p>\n<p>Les alertes personnalis\u00e9es peuvent \u00eatre g\u00e9n\u00e9r\u00e9es, et les analyses peuvent \u00eatre ajout\u00e9es \u00e0 n&rsquo;importe quelle cam\u00e9ra.<\/p>\n<p>Pour des informations plus d\u00e9taill\u00e9es sur l&rsquo;activation de ces fonctionnalit\u00e9s, cliquez <a href=\"https:\/\/www.een.com\/fr\/activation-analyses\/\">ici<\/a>, ou appelez l&rsquo;\u00c9quipe de Support au\u00a0+1-512-473-0501. Vous pouvez \u00e9galement en apprendre plus sur ces analyses sp\u00e9cifiques ici :<\/p>\n<ul>\n<li><a href=\"https:\/\/www.een.com\/fr\/analyse-franchissement-ligne\/\">Franchissement de Ligne<\/a><\/li>\n<li><a href=\"https:\/\/www.een.com\/fr\/analyse-detection-intrusion\/\">D\u00e9tection d&rsquo;Intrusion<\/a><\/li>\n<\/ul>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-34305\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image.png\" alt=\"\" width=\"503\" height=\"335\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image.png 952w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image-300x200.png 300w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image-100x67.png 100w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image-195x130.png 195w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image-200x134.png 200w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image-400x267.png 400w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image-600x401.png 600w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/Security-Analytics-New-Line-Crossing-Image-800x534.png 800w\" sizes=\"(max-width: 503px) 100vw, 503px\" \/><\/p>\n<p>Contactez Nous<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Eagle Eye Networks a lanc\u00e9 des outils d&rsquo;analyse de Franchissement de Ligne et de D\u00e9tection d&rsquo;Intrusion pour le VMS de Cam\u00e9ras de S\u00e9curit\u00e9 Eagle Eye. Ces donn\u00e9es analytiques permettent d&rsquo;analyser &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/fr\/blog\/analyses-securite\/\"> <span class=\"screen-reader-text\">Analyses de S\u00e9curit\u00e9<\/span> Lire la suite\u00a0\u00bb<\/a><\/p>\n","protected":false},"author":544,"featured_media":34305,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"40061,40337,40469,39010,107618,116940","_relevanssi_noindex_reason":"","footnotes":""},"categories":[455],"tags":[1381,1390,1285,1296],"class_list":["post-39084","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-videosurveillance","tag-video-analyse-fr","tag-logiciel-gestion-video","tag-surveillance-video-dans-le-cloud","tag-systeme-camera-securite"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/posts\/39084","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/users\/544"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/comments?post=39084"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/posts\/39084\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/media\/34305"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/media?parent=39084"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/categories?post=39084"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/tags?post=39084"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}