{"id":25261,"date":"2021-09-04T18:01:22","date_gmt":"2021-09-04T18:01:22","guid":{"rendered":"https:\/\/ostecit.com\/fr\/?page_id=25261"},"modified":"2024-06-10T12:05:55","modified_gmt":"2024-06-10T12:05:55","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/ostecit.com\/fr\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><section data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid services-main-page-banner vc_hidden-sm vc_hidden-xs vc_custom_1644565321278 cover-background bg-position-right-bottom vc_row-has-fill pofo-stretch-content pofo-stretch-row-container\"><div class=\"wpb_column vc_column_container vc_col-sm-12  col-xs-mobile-fullwidth xs-display-none\"><div class=\"vc_column-inner \"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid who-we-are-page-banner-overlay  vc_row-o-content-middle vc_row-flex overflow-visible\"><div class=\"wpb_column vc_column_container vc_col-sm-12  col-xs-mobile-fullwidth\"><div class=\"vc_column-inner \"><div class=\"wpb_wrapper\">[vc_empty_space height=&#8221;400px&#8221;]<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><div class=\"vc_row-full-width vc_clearfix\"><\/div><section data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid home-industry-row no-top-bottom-padding vc_hidden-sm vc_hidden-xs vc_custom_1644731337405 position-relative overflow-visible vc_row-has-fill pofo-stretch-content pofo-stretch-row-container\"><div class=\"wpb_column vc_column_container vc_col-sm-12  col-xs-mobile-fullwidth\"><div class=\"vc_column-inner \"><div class=\"wpb_wrapper\">[vc_empty_space height=&#8221;550px&#8221; el_class=&#8221;vc_hidden-lg vc_hidden-md&#8221;]<div class=\"vc_row wpb_row vc_inner vc_row-fluid push-up-banner vc_custom_1630784741578 vc_row-has-fill overflow-visible bg-position-left-top\"><div class=\"wpb_column vc_column_container vc_col-has-fill who-we-are-sub-banner-image spaced-sub-banner-image vc_col-sm-8  col-xs-mobile-fullwidth xs-display-none\"><div class=\"vc_column-inner cover-background bg-position-center-center vc_custom_1676309648424\"><div class=\"wpb_wrapper\">[vc_empty_space height=&#8221;420px&#8221;][vc_custom_heading text=&#8221;CyberS\u00e9curit\u00e9&#8221; el_class=&#8221;service-banner-title&#8221;]<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-has-fill push-up-banner-title-box vc_col-sm-4  col-xs-mobile-fullwidth\"><div class=\"vc_column-inner vc_custom_1629798391728\"><div class=\"wpb_wrapper\"><div class=\"who-we-are-banner-text-box grand-text poppins-font last-paragraph-no-margin\" style=\"color: #ffffff;\"><p><span style=\"font-size: 35px; font-weight: 400; line-height: 1.2;\">Innovez en toute confiance tout en prot\u00e9geant vos actifs des cyberattaques co\u00fbteuses.<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div>[vc_raw_html]JTNDZGl2JTIwaWQlM0QlMjJwYXJ0aWNsZXMtanMlMjIlM0UlM0MlMkZkaXYlM0UlMjAlMEElM0MlMjEtLSUyMHBhcnRpY2xlcy5qcyUyMGxpYiUyMC0lMjBodHRwcyUzQSUyRiUyRmdpdGh1Yi5jb20lMkZWaW5jZW50R2FycmVhdSUyRnBhcnRpY2xlcy5qcyUyMC0tJTNFJTIwJTBBJTNDc2NyaXB0JTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZjZG4uanNkZWxpdnIubmV0JTJGcGFydGljbGVzLmpzJTJGMi4wLjAlMkZwYXJ0aWNsZXMubWluLmpzJTIyJTNFJTNDJTJGc2NyaXB0JTNFJTBB[\/vc_raw_html][vc_raw_js]JTNDc2NyaXB0JTNFJTBBJTBBcGFydGljbGVzSlMlMjglMjJwYXJ0aWNsZXMtanMlMjIlMkMlMjAlN0IlMjJwYXJ0aWNsZXMlMjIlM0ElN0IlMjJudW1iZXIlMjIlM0ElN0IlMjJ2YWx1ZSUyMiUzQTgwJTJDJTIyZGVuc2l0eSUyMiUzQSU3QiUyMmVuYWJsZSUyMiUzQXRydWUlMkMlMjJ2YWx1ZV9hcmVhJTIyJTNBODAwJTdEJTdEJTJDJTIyY29sb3IlMjIlM0ElN0IlMjJ2YWx1ZSUyMiUzQSUyMiUyM2NjY2NjYyUyMiU3RCUyQyUyMnNoYXBlJTIyJTNBJTdCJTIydHlwZSUyMiUzQSUyMmNpcmNsZSUyMiUyQyUyMnN0cm9rZSUyMiUzQSU3QiUyMndpZHRoJTIyJTNBMCUyQyUyMmNvbG9yJTIyJTNBJTIyJTIzMDAwMDAwJTIyJTdEJTJDJTIycG9seWdvbiUyMiUzQSU3QiUyMm5iX3NpZGVzJTIyJTNBNSU3RCUyQyUyMmltYWdlJTIyJTNBJTdCJTIyc3JjJTIyJTNBJTIyaW1nJTJGZ2l0aHViLnN2ZyUyMiUyQyUyMndpZHRoJTIyJTNBMTAwJTJDJTIyaGVpZ2h0JTIyJTNBMTAwJTdEJTdEJTJDJTIyb3BhY2l0eSUyMiUzQSU3QiUyMnZhbHVlJTIyJTNBMC41JTJDJTIycmFuZG9tJTIyJTNBZmFsc2UlMkMlMjJhbmltJTIyJTNBJTdCJTIyZW5hYmxlJTIyJTNBZmFsc2UlMkMlMjJzcGVlZCUyMiUzQTElMkMlMjJvcGFjaXR5X21pbiUyMiUzQTAuMSUyQyUyMnN5bmMlMjIlM0FmYWxzZSU3RCU3RCUyQyUyMnNpemUlMjIlM0ElN0IlMjJ2YWx1ZSUyMiUzQTMlMkMlMjJyYW5kb20lMjIlM0F0cnVlJTJDJTIyYW5pbSUyMiUzQSU3QiUyMmVuYWJsZSUyMiUzQWZhbHNlJTJDJTIyc3BlZWQlMjIlM0E0MCUyQyUyMnNpemVfbWluJTIyJTNBMC4xJTJDJTIyc3luYyUyMiUzQWZhbHNlJTdEJTdEJTJDJTIybGluZV9saW5rZWQlMjIlM0ElN0IlMjJlbmFibGUlMjIlM0F0cnVlJTJDJTIyZGlzdGFuY2UlMjIlM0ExNTAlMkMlMjJjb2xvciUyMiUzQSUyMiUyM2NjY2NjYyUyMiUyQyUyMm9wYWNpdHklMjIlM0EwLjQlMkMlMjJ3aWR0aCUyMiUzQTElN0QlMkMlMjJtb3ZlJTIyJTNBJTdCJTIyZW5hYmxlJTIyJTNBdHJ1ZSUyQyUyMnNwZWVkJTIyJTNBNiUyQyUyMmRpcmVjdGlvbiUyMiUzQSUyMm5vbmUlMjIlMkMlMjJyYW5kb20lMjIlM0FmYWxzZSUyQyUyMnN0cmFpZ2h0JTIyJTNBZmFsc2UlMkMlMjJvdXRfbW9kZSUyMiUzQSUyMm91dCUyMiUyQyUyMmJvdW5jZSUyMiUzQWZhbHNlJTJDJTIyYXR0cmFjdCUyMiUzQSU3QiUyMmVuYWJsZSUyMiUzQWZhbHNlJTJDJTIycm90YXRlWCUyMiUzQTYwMCUyQyUyMnJvdGF0ZVklMjIlM0ExMjAwJTdEJTdEJTdEJTJDJTIyaW50ZXJhY3Rpdml0eSUyMiUzQSU3QiUyMmRldGVjdF9vbiUyMiUzQSUyMmNhbnZhcyUyMiUyQyUyMmV2ZW50cyUyMiUzQSU3QiUyMm9uaG92ZXIlMjIlM0ElN0IlMjJlbmFibGUlMjIlM0F0cnVlJTJDJTIybW9kZSUyMiUzQSUyMnJlcHVsc2UlMjIlN0QlMkMlMjJvbmNsaWNrJTIyJTNBJTdCJTIyZW5hYmxlJTIyJTNBdHJ1ZSUyQyUyMm1vZGUlMjIlM0ElMjJwdXNoJTIyJTdEJTJDJTIycmVzaXplJTIyJTNBdHJ1ZSU3RCUyQyUyMm1vZGVzJTIyJTNBJTdCJTIyZ3JhYiUyMiUzQSU3QiUyMmRpc3RhbmNlJTIyJTNBNDAwJTJDJTIybGluZV9saW5rZWQlMjIlM0ElN0IlMjJvcGFjaXR5JTIyJTNBMSU3RCU3RCUyQyUyMmJ1YmJsZSUyMiUzQSU3QiUyMmRpc3RhbmNlJTIyJTNBNDAwJTJDJTIyc2l6ZSUyMiUzQTQwJTJDJTIyZHVyYXRpb24lMjIlM0EyJTJDJTIyb3BhY2l0eSUyMiUzQTglMkMlMjJzcGVlZCUyMiUzQTMlN0QlMkMlMjJyZXB1bHNlJTIyJTNBJTdCJTIyZGlzdGFuY2UlMjIlM0EyMDAlMkMlMjJkdXJhdGlvbiUyMiUzQTAuNCU3RCUyQyUyMnB1c2glMjIlM0ElN0IlMjJwYXJ0aWNsZXNfbmIlMjIlM0E0JTdEJTJDJTIycmVtb3ZlJTIyJTNBJTdCJTIycGFydGljbGVzX25iJTIyJTNBMiU3RCU3RCU3RCUyQyUyMnJldGluYV9kZXRlY3QlMjIlM0F0cnVlJTdEJTI5JTNCJTBBJTBBJTNDJTJGc2NyaXB0JTNF[\/vc_raw_js][vc_empty_space height=&#8221;90px&#8221;][vc_custom_heading text=&#8221;S\u00c9CURIT\u00c9 CYBER&#8221; font_container=&#8221;tag:h2|font_size:14px|text_align:center|color:%232c54c7&#8243; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:500%20bold%20regular%3A500%3Anormal&#8221; el_class=&#8221;no-margin-top no-line-height section-pre-header&#8221;][vc_custom_heading text=&#8221;Nous apportons des Solutions de cybers\u00e9curit\u00e9 pratiques, \u00e9prouv\u00e9s et de<br \/>\nclasse mondiale aux organisations de toutes tailles.&#8221; font_container=&#8221;tag:h2|font_size:25px|text_align:center|color:%23000000|line_height:1.3&#8243; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal&#8221; el_class=&#8221;no-margin-top section-header poppins-font services-page-sub-header&#8221;][vc_empty_space height=&#8221;0px&#8221;]<div class=\"vc_row wpb_row vc_inner vc_row-fluid home-industry-boxes vc_custom_1629625933586 vc_column-gap-5 vc_row-o-content-middle vc_row-flex\"><div class=\"wpb_column vc_column_container home-industry-box top-left-border-radius services-industry-box vc_col-sm-6 vc_col-xs-12\"><div class=\"vc_column-inner vc_custom_1644731129634\"><div class=\"wpb_wrapper\"><div class=\"last-paragraph-no-margin\"><div class=\"row serv-ind-box-height-20p\">\n<div class=\"col-md-2 col-sm-12\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-26845 size-thumbnail\" src=\"https:\/\/ostecit.com\/fr\/wp-content\/uploads\/\/2022\/01\/Security-Operations-Centre-icon-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/div>\n<div class=\"col-md-10 col-sm-12\"><span class=\"title no-margins no-padding\">Centre Des Op\u00e9rations De S\u00e9curit\u00e9 (SOC)<\/span><\/div>\n<\/div>\n<div class=\"row serv-ind-box-height-70p\">\n<div class=\"col-md-2\"><\/div>\n<div class=\"col-md-10 col-sm-12 description\">Ostec construit et exploite un centre d&#8217;op\u00e9rations de s\u00e9curit\u00e9 (SOC) 24h\/24 et 7j\/7 aliment\u00e9 par l&#8217;intelligence artificielle avec une automatisation de la s\u00e9curit\u00e9 int\u00e9gr\u00e9e. Construit sur notre suite XDR unique et leader du secteur, il offre une visibilit\u00e9 in\u00e9gal\u00e9e, une d\u00e9tection des menaces bas\u00e9e sur l&#8217;IA et des capacit\u00e9s de r\u00e9ponse automatis\u00e9es, ce qui permet de r\u00e9duire les co\u00fbts en tirant parti des outils technologiques existants.<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container home-industry-box top-right-border-radius services-industry-box vc_col-sm-6  col-xs-mobile-fullwidth\"><div class=\"vc_column-inner vc_custom_1630786517215\"><div class=\"wpb_wrapper\"><div class=\"last-paragraph-no-margin\"><div class=\"row serv-ind-box-height-20p\">\n<div class=\"col-md-2\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-26843 size-thumbnail\" src=\"https:\/\/ostecit.com\/fr\/wp-content\/uploads\/\/2022\/01\/Ransomware-protection-icon-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/div>\n<div class=\"col-md-10 col-sm-12\"><span class=\"title no-margins no-padding\">Protection Contre Les Ransomwares<\/span><\/div>\n<\/div>\n<div class=\"row serv-ind-box-height-70p\">\n<div class=\"col-md-2\"><\/div>\n<div class=\"col-md-10 description\">Prot\u00e9gez vos actifs contre les attaques de ransomwares co\u00fbteuses et perturbatrices gr\u00e2ce \u00e0 notre gestion proactive des risques et \u00e0 notre approche Zero-Trust pour pr\u00e9venir, d\u00e9tecter et r\u00e9pondre avec pr\u00e9cision aux attaques de ransomwares. Nous fournissons \u00e9galement une r\u00e9cup\u00e9ration s\u00e9curis\u00e9e des donn\u00e9es apr\u00e8s une attaque.<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid home-industry-boxes vc_custom_1629625939813 vc_column-gap-5 vc_row-o-content-middle vc_row-flex\"><div class=\"wpb_column vc_column_container home-industry-box services-industry-box vc_col-sm-6  col-xs-mobile-fullwidth\"><div class=\"vc_column-inner vc_custom_1674443037094\"><div class=\"wpb_wrapper\"><div class=\"last-paragraph-no-margin\"><div class=\"row serv-ind-box-height-20p\">\n<div class=\"col-md-2\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-26842 size-thumbnail\" src=\"https:\/\/ostecit.com\/fr\/wp-content\/uploads\/\/2022\/01\/Penetration-Testing-icon-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/div>\n<div class=\"col-md-10 col-sm-12\"><span class=\"title no-margins no-padding\">Zero \u2013 Trust<\/span><\/div>\n<\/div>\n<div class=\"row serv-ind-box-height-70p\">\n<div class=\"col-md-2\"><\/div>\n<div class=\"col-md-10 description\">Notre strat\u00e9gie de s\u00e9curit\u00e9 confiance z\u00e9ro aide les organisations \u00e0 accro\u00eetre leur cyber-r\u00e9silience et \u00e0 g\u00e9rer les risques d&#8217;un environnement d&#8217;entreprise multi-cloud ou cloud hybride tout en permettant aux utilisateurs d&#8217;acc\u00e9der aux ressources appropri\u00e9es. Il utilise le contexte pour connecter en toute s\u00e9curit\u00e9 les bons utilisateurs aux bonnes donn\u00e9es au bon moment et dans les bonnes conditions, tout en prot\u00e9geant votre organisation contre les cybermenaces.<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container home-industry-box services-industry-box vc_col-sm-6  col-xs-mobile-fullwidth\"><div class=\"vc_column-inner vc_custom_1674443048845\"><div class=\"wpb_wrapper\"><div class=\"last-paragraph-no-margin\"><div class=\"row serv-ind-box-height-20p\">\n<div class=\"col-md-2\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-26837 size-thumbnail\" src=\"https:\/\/ostecit.com\/fr\/wp-content\/uploads\/\/2022\/01\/Data-Security-icon-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/div>\n<div class=\"col-md-10\"><span class=\"title no-margins no-padding\">S\u00e9curit\u00e9 Des Donn\u00e9es.<\/span><\/div>\n<\/div>\n<div class=\"row serv-ind-box-height-70p\">\n<div class=\"col-md-2\"><\/div>\n<div class=\"col-md-10 description\">Au fur et \u00e0 mesure que l&#8217;empreinte des donn\u00e9es de votre organisation s&#8217;\u00e9tend \u00e0 divers environnements, votre champ de menaces s&#8217;\u00e9tend \u00e9galement, exposant des informations sensibles et pr\u00e9cieuses aux menaces. Prot\u00e9gez vos donn\u00e9es partout avec un syst\u00e8me centralis\u00e9 et unifi\u00e9 align\u00e9 avec votre strat\u00e9gie d&#8217;entreprise.<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid home-industry-boxes vc_custom_1629625939813 vc_column-gap-5 vc_row-o-content-middle vc_row-flex\"><div class=\"wpb_column vc_column_container home-industry-box bottom-left-border-radius services-industry-box vc_col-sm-6  col-xs-mobile-fullwidth\"><div class=\"vc_column-inner vc_custom_1630786555731\"><div class=\"wpb_wrapper\"><div class=\"last-paragraph-no-margin\"><div class=\"row serv-ind-box-height-20p\">\n<div class=\"col-md-2\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-28114 size-thumbnail\" src=\"https:\/\/ostecit.com\/fr\/wp-content\/uploads\/\/2023\/01\/Cloud-security-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/div>\n<div class=\"col-md-10\"><span class=\"title no-margins no-padding\">S\u00e9curit\u00e9 Cloud<\/span><\/div>\n<\/div>\n<div class=\"row serv-ind-box-height-70p\">\n<div class=\"col-md-2\"><\/div>\n<div class=\"col-md-10 description\">Nos solutions de s\u00e9curit\u00e9 et nos experts peuvent vous aider \u00e0 int\u00e9grer les contr\u00f4les appropri\u00e9s et \u00e0 \u00e9tablir une gestion des menaces unifi\u00e9e et efficace pour vos environnements d&#8217;entreprise hybrides et multi-cloud.<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container home-industry-box bottom-right-border-radius services-industry-box vc_col-sm-6  col-xs-mobile-fullwidth\"><div class=\"vc_column-inner vc_custom_1630786547303\"><div class=\"wpb_wrapper\"><div class=\"last-paragraph-no-margin\"><div class=\"row serv-ind-box-height-20p\">\n<div class=\"col-md-2\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-28115 size-thumbnail\" src=\"https:\/\/ostecit.com\/fr\/wp-content\/uploads\/\/2023\/01\/Insider-threat-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/div>\n<div class=\"col-md-10\"><span class=\"title no-margins no-padding\">Menace Interne<\/span><\/div>\n<\/div>\n<div class=\"row serv-ind-box-height-70p\">\n<div class=\"col-md-2\"><\/div>\n<div class=\"col-md-10 description\">Prot\u00e9gez votre r\u00e9seau et vos actifs critiques contre le personnel Interne malveillants et n\u00e9gligents gr\u00e2ce \u00e0 notre ensemble de technologies int\u00e9gr\u00e9es \u00e0 l&#8217;apprentissage automatique, \u00e0 l&#8217;IA et \u00e0 l&#8217;analyse.<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>[vc_empty_space height=&#8221;90px&#8221;][vc_single_image image=&#8221;28722&#8243; img_size=&#8221;full&#8221;][vc_empty_space height=&#8221;200px&#8221;]<\/div><\/div><\/div><\/section><div class=\"vc_row-full-width vc_clearfix\"><\/div><section id=\"acc-holder\" data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid no-top-bottom-padding padding-50-box vc_hidden-sm vc_hidden-xs vc_custom_1644565844433 position-relative overflow-visible pofo-stretch-content pofo-stretch-row-container\"><div class=\"wpb_column vc_column_container vc_col-sm-12  col-xs-mobile-fullwidth\"><div class=\"vc_column-inner \"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid who-we-are-accordion-container height-870 vc_custom_1643294963740 vc_row-has-fill position-relative cover-background bg-position-center-center\"><div class=\"wpb_column vc_column_container vc_col-has-fill who-we-are-accordion vc_col-sm-6  col-xs-mobile-fullwidth\"><div class=\"vc_column-inner vc_custom_1641426348070\"><div class=\"wpb_wrapper\">[vc_custom_heading text=&#8221;AVANTAGES&#8221; font_container=&#8221;tag:h5|font_size:38px|text_align:left|color:%23ffffff|line_height:45px&#8221; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:500%20bold%20regular%3A500%3Anormal&#8221; el_class=&#8221;poppins-font section-pre-header no-margins industry-page&#8221; css=&#8221;.vc_custom_1689471402237{padding-top: 20px !important;}&#8221;][vc_custom_heading text=&#8221;B\u00e9n\u00e9fices exclusifs de la cybers\u00e9curit\u00e9&#8221; font_container=&#8221;tag:h5|font_size:33px|text_align:left|color:%23ffffff|line_height:45px&#8221; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal&#8221; el_class=&#8221;poppins-font&#8221;]<div class=\"panel-group accordion-style1\" id=\"accordion-1\" ><div class=\"panel text-left\">\n                                        <div class=\"panel-heading active-accordion\">\n                                            <a data-toggle=\"collapse\" data-parent=\"#accordion-1\" href=\"#accordion-one-link-1\">\n                                                <div class=\"panel-title font-weight-500 text-extra-dark-gray\" style=\"font-size: 16px; font-weight: 500; color: #ffffff;\" data-fontsize=\"16px\">\n                                                    Pr\u00e9venez les pertes financi\u00e8res de votre organisation et de vos clients<span class=\"pull-right\"><i class=\"ti-minus\"><\/i><\/span>\n                                                <\/div>\n                                            <\/a>\n                                        <\/div>\n                                        <div id=\"accordion-one-link-1\" class=\"panel-collapse collapse in\">\n                                            <div class=\"panel-body \" style=\"font-size: 13px; color: rgba(255,255,255,0.9);\" data-fontsize=\"13px\"><p>Une faille dans la cybers\u00e9curit\u00e9 d'une organisation peut entra\u00eener des perturbations majeures et nuire \u00e0 l'organisation et \u00e0 ses clients. Beaucoup d'argent et de temps sont en outre perdus dans les enqu\u00eates m\u00e9dico-l\u00e9gales, la r\u00e9cup\u00e9ration des donn\u00e9es et la restauration des op\u00e9rations normales.<\/p>\n<\/div>\n                                        <\/div>\n                                    <\/div><div class=\"panel text-left\">\n                                        <div class=\"panel-heading \">\n                                            <a data-toggle=\"collapse\" data-parent=\"#accordion-1\" href=\"#accordion-one-link-2\">\n                                                <div class=\"panel-title font-weight-500 text-extra-dark-gray\" style=\"font-size: 16px; font-weight: 500; color: #ffffff;\" data-fontsize=\"16px\">\n                                                    Prot\u00e9gez les donn\u00e9es des clients<span class=\"pull-right\"><i class=\"ti-plus\"><\/i><\/span>\n                                                <\/div>\n                                            <\/a>\n                                        <\/div>\n                                        <div id=\"accordion-one-link-2\" class=\"panel-collapse collapse \">\n                                            <div class=\"panel-body \" style=\"font-size: 13px; color: rgba(255,255,255,0.9);\" data-fontsize=\"13px\"><p>De nombreux clients sont pr\u00e9occup\u00e9s par la s\u00e9curit\u00e9 de leurs donn\u00e9es car il y a eu plusieurs cas o\u00f9 les donn\u00e9es personnelles de clients innocents ont \u00e9t\u00e9 utilis\u00e9es pour commettre des crimes et parfois utilis\u00e9es pour compromettre les individus eux-m\u00eames.<\/p>\n<\/div>\n                                        <\/div>\n                                    <\/div><div class=\"panel text-left\">\n                                        <div class=\"panel-heading \">\n                                            <a data-toggle=\"collapse\" data-parent=\"#accordion-1\" href=\"#accordion-one-link-3\">\n                                                <div class=\"panel-title font-weight-500 text-extra-dark-gray\" style=\"font-size: 16px; font-weight: 500; color: #ffffff;\" data-fontsize=\"16px\">\n                                                    Pr\u00e9servez la r\u00e9putation de votre entreprise<span class=\"pull-right\"><i class=\"ti-plus\"><\/i><\/span>\n                                                <\/div>\n                                            <\/a>\n                                        <\/div>\n                                        <div id=\"accordion-one-link-3\" class=\"panel-collapse collapse \">\n                                            <div class=\"panel-body \" style=\"font-size: 13px; color: rgba(255,255,255,0.9);\" data-fontsize=\"13px\"><p>Une simple faille dans la d\u00e9fense de la cybers\u00e9curit\u00e9 d'une organisation peut gravement nuire \u00e0 sa r\u00e9putation. Les violations de donn\u00e9es peuvent entra\u00eener la perte de confiance du public et l'ins\u00e9curit\u00e9 des clients. Il est donc tr\u00e8s important de s'associer \u00e0 des organisations reconnues et d'investir dans les bonnes technologies pour prot\u00e9ger votre organisation des cyberattaques.<\/p>\n<\/div>\n                                        <\/div>\n                                    <\/div><div class=\"panel text-left\">\n                                        <div class=\"panel-heading \">\n                                            <a data-toggle=\"collapse\" data-parent=\"#accordion-1\" href=\"#accordion-one-link-4\">\n                                                <div class=\"panel-title font-weight-500 text-extra-dark-gray\" style=\"font-size: 16px; font-weight: 500; color: #ffffff;\" data-fontsize=\"16px\">\n                                                    \u00c9viter les p\u00e9nalit\u00e9s pour non-conformit\u00e9 r\u00e9glementaire<span class=\"pull-right\"><i class=\"ti-plus\"><\/i><\/span>\n                                                <\/div>\n                                            <\/a>\n                                        <\/div>\n                                        <div id=\"accordion-one-link-4\" class=\"panel-collapse collapse \">\n                                            <div class=\"panel-body \" style=\"font-size: 13px; color: rgba(255,255,255,0.9);\" data-fontsize=\"13px\"><p>Aucune organisation r\u00e9put\u00e9e ne veut faire face \u00e0 des sanctions en cas de non-conformit\u00e9, car il pourrait \u00eatre difficile de s'en sortir.<\/p>\n<\/div>\n                                        <\/div>\n                                    <\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6  col-xs-mobile-fullwidth xs-display-none\"><div class=\"vc_column-inner vc_custom_1644565689734\"><div class=\"wpb_wrapper\">[vc_empty_space]<\/div><\/div><\/div><\/div>[vc_empty_space height=&#8221;90px&#8221;]<\/div><\/div><\/div><\/section><div class=\"vc_row-full-width vc_clearfix\"><\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"[vc_empty_space height=\"400px\"][vc_empty_space height=\"550px\" el_class=\"vc_hidden-lg vc_hidden-md\"][vc_empty_space height=\"420px\"][vc_custom_heading text=\"CyberS\u00e9curit\u00e9\" el_class=\"service-banner-title\"]Innovez en toute confiance tout en prot\u00e9geant vos actifs des cyberattaques co\u00fbteuses. [vc_raw_html]JTNDZGl2JTIwaWQlM0QlMjJwYXJ0aWNsZXMtanMlMjIlM0UlM0MlMkZkaXYlM0UlMjAlMEElM0MlMjEtLSUyMHBhcnRpY2xlcy5qcyUyMGxpYiUyMC0lMjBodHRwcyUzQSUyRiUyRmdpdGh1Yi5jb20lMkZWaW5jZW50R2FycmVhdSUyRnBhcnRpY2xlcy5qcyUyMC0tJTNFJTIwJTBBJTNDc2NyaXB0JTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZjZG4uanNkZWxpdnIubmV0JTJGcGFydGljbGVzLmpzJTJGMi4wLjAlMkZwYXJ0aWNsZXMubWluLmpzJTIyJTNFJTNDJTJGc2NyaXB0JTNFJTBB[\/vc_raw_html][vc_raw_js]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[\/vc_raw_js][vc_empty_space height=\"90px\"][vc_custom_heading text=\"S\u00c9CURIT\u00c9 CYBER\" font_container=\"tag:h2|font_size:14px|text_align:center|color:%232c54c7\" google_fonts=\"font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:500%20bold%20regular%3A500%3Anormal\" el_class=\"no-margin-top no-line-height section-pre-header\"][vc_custom_heading text=\"Nous apportons des Solutions de cybers\u00e9curit\u00e9 pratiques, \u00e9prouv\u00e9s et de classe mondiale aux organisations de toutes tailles.\" font_container=\"tag:h2|font_size:25px|text_align:center|color:%23000000|line_height:1.3\" google_fonts=\"font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal\" el_class=\"no-margin-top section-header poppins-font services-page-sub-header\"][vc_empty_space height=\"0px\"] Centre Des Op\u00e9rations De S\u00e9curit\u00e9 (SOC) Ostec construit et exploite un centre d'op\u00e9rations de s\u00e9curit\u00e9 (SOC) 24h\/24 et 7j\/7 aliment\u00e9 par l'intelligence artificielle avec une automatisation de la s\u00e9curit\u00e9 int\u00e9gr\u00e9e. Construit sur notre suite XDR unique et leader du secteur, il offre une visibilit\u00e9 in\u00e9gal\u00e9e, une d\u00e9tection des menaces bas\u00e9e sur l'IA et des capacit\u00e9s de r\u00e9ponse automatis\u00e9es, ce qui permet de r\u00e9duire les co\u00fbts en tirant parti des outils technologiques existants. Protection Contre Les Ransomwares Prot\u00e9gez vos actifs contre les attaques de ransomwares co\u00fbteuses et perturbatrices gr\u00e2ce \u00e0 notre gestion proactive des risques et \u00e0 notre approche Zero-Trust pour pr\u00e9venir, d\u00e9tecter et r\u00e9pondre avec pr\u00e9cision aux attaques de ransomwares. Nous fournissons \u00e9galement une r\u00e9cup\u00e9ration s\u00e9curis\u00e9e des donn\u00e9es apr\u00e8s une attaque. Zero \u2013 Trust Notre strat\u00e9gie de s\u00e9curit\u00e9 confiance z\u00e9ro aide les organisations \u00e0 accro\u00eetre leur cyber-r\u00e9silience et \u00e0 g\u00e9rer les risques d'un environnement d'entreprise multi-cloud ou cloud...","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/ostecit.com\/fr\/wp-json\/wp\/v2\/pages\/25261"}],"collection":[{"href":"https:\/\/ostecit.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ostecit.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ostecit.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ostecit.com\/fr\/wp-json\/wp\/v2\/comments?post=25261"}],"version-history":[{"count":17,"href":"https:\/\/ostecit.com\/fr\/wp-json\/wp\/v2\/pages\/25261\/revisions"}],"predecessor-version":[{"id":28723,"href":"https:\/\/ostecit.com\/fr\/wp-json\/wp\/v2\/pages\/25261\/revisions\/28723"}],"wp:attachment":[{"href":"https:\/\/ostecit.com\/fr\/wp-json\/wp\/v2\/media?parent=25261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}