IT Security and Monitoring

SOC (Security Operation Center) – SIEM (Security Information Event Management) – Dashboards

Internal Digital Investigations

Fraud – Information Theft – Employee Theft – Infections

Infrastructure Security

Active Directory Security – Update Management  – Centralized Alert Monitoring

Security Audits

Perimeter Security Check – Security Policies  – Internal Procedures

Prevention

Incident Management Procedures – Disaster Recovery – Sensitization

Cyber Security Services

In a world necessarily connected, where payment methods and communications are increasingly electronic, the risk of fraud or disaster is great.

Protect your assets, employees and business by developing a survival and business continuity plan in the face of a computer disaster. Protect yourself against internal incidents (harassment, theft of information or internal manipulation), but also to face external threats (fraudulent access, infections). Since it is difficult to have all the specialists able to manage exceptional situations available in each of the fields, it is important to be able to call on experts.

MANAGEMENT OF SECURITY ALERTS

MANAGEMENT OF SECURITY ALERTS

Installation or evaluation of alert management tools such as a log collector or SIEM (Security Information Event Management). Proposed indicators of safety measures usable with dashboards.

RISK ANALYSIS

RISK ANALYSIS

Conduct a risk analysis, controls and countermeasures in the network and the company’s systems. Revision and updating of security policies.

DEPLOYMENT OF SECURITY TOOLS

DEPLOYMENT OF SECURITY TOOLS

Incorporation of new applications or security functions such as firewall, IPS, Internet filtering and encryption. We advise you in all stages; Validation and definition of architecture, choice of suppliers, installation and configuration, user guides and operator training.

COMPUTER FORENSICS

COMPUTER FORENSICS

Digital survey of an event through the following stages: data collection, analysis and presentation of results. Internal harassment, fraud, theft of data, but also external threats (infection and fraudulent access).

NETWORK SECURITY

NETWORK SECURITY

Securing your network perimeter and a good segregation of assets is essential. Risk levels and control requirements vary by area; WAN, DMZ, Intranet and VLAN. The continuity of your business depends entirely on the availability of the network.

INFRASTRUCTURE SECURITY

INFRASTRUCTURE SECURITY

Evaluate and secure core devices such as domain controllers, Active Directory, and file servers. We also manage updates, backups and centralized monitoring of alerts.

EVALUATION

EVALUATION

Evaluation of the level of security across the various tasks of network operation and systems of the company. Definition of a confidence index in the face of a computer disaster (procedure for managing backup incidents, revision of mechanisms for updating software vulnerabilities)

SENSITIZATION

SENSITIZATION

Sensitize employees to safety in the company. Learn to detect them and guard against threats: fraud, hacking, phishing, information theft, malicious infection.

Cyberthreat Emergency Response Unit

Cyberthreat Emergency Response Unit (CERU)
Under attack? Contact us right now for an immediate intervention.

NEWSLETTER

Join our news bulletin:

Sign me up now!

VIDEOS

CONTACT