IT Security and Monitoring

SOC (Security Operation Center) – SIEM (Security Information Event Management) – Dashboards

Internal Digital Investigations

Fraud – Information Theft – Employee Theft – Infections

Infrastructure Security

Active Directory Security – Update Management  – Centralized Alert Monitoring

Security Audits

Perimeter Security Check – Security Policies  – Internal Procedures

Prevention

Incident Management Procedures – Disaster Recovery – Sensitization

Cyber Security Services

In a world necessarily connected, where payment methods and communications are increasingly electronic, the risk of fraud or disaster is great.

Protect your assets, employees and business by developing a survival and business continuity plan in the face of a computer disaster. Protect yourself against internal incidents (harassment, theft of information or internal manipulation), but also to face external threats (fraudulent access, infections). Since it is difficult to have all the specialists able to manage exceptional situations available in each of the fields, it is important to be able to call on experts.

MANAGEMENT OF SECURITY ALERTS

MANAGEMENT OF SECURITY ALERTS

Installation or evaluation of alert management tools such as a log collector or SIEM (Security Information Event Management). Proposed indicators of safety measures usable with dashboards.

RISK ANALYSIS

RISK ANALYSIS

Conduct a risk analysis, controls and countermeasures in the network and the company’s systems. Revision and updating of security policies.

DEPLOYMENT OF SECURITY TOOLS

DEPLOYMENT OF SECURITY TOOLS

Incorporation of new applications or security functions such as firewall, IPS, Internet filtering and encryption. We advise you in all stages; Validation and definition of architecture, choice of suppliers, installation and configuration, user guides and operator training.

COMPUTER FORENSICS

COMPUTER FORENSICS

Digital survey of an event through the following stages: data collection, analysis and presentation of results. Internal harassment, fraud, theft of data, but also external threats (infection and fraudulent access).

NETWORK SECURITY

NETWORK SECURITY

Securing your network perimeter and a good segregation of assets is essential. Risk levels and control requirements vary by area; WAN, DMZ, Intranet and VLAN. The continuity of your business depends entirely on the availability of the network.

INFRASTRUCTURE SECURITY

INFRASTRUCTURE SECURITY

Evaluate and secure core devices such as domain controllers, Active Directory, and file servers. We also manage updates, backups and centralized monitoring of alerts.

EVALUATION

EVALUATION

Evaluation of the level of security across the various tasks of network operation and systems of the company. Definition of a confidence index in the face of a computer disaster (procedure for managing backup incidents, revision of mechanisms for updating software vulnerabilities)

SENSITIZATION

SENSITIZATION

Sensitize employees to safety in the company. Learn to detect them and guard against threats: fraud, hacking, phishing, information theft, malicious infection.

Cyberthreat Emergency Response Unit

Cyberthreat Emergency Response Unit (CERU)
Under attack? Contact us right now for an immediate intervention.

TEAM

Our cybersecurity and information security team consists of security, networking and systems specialists. We can contribute to the development of your cybersecurity strategy, from the development of the plan to its final deployment, to provide the necessary protection required by your IT infrastructure.

Alexandre Ouaknine, Architecte Système Senior.
Cyrille Aubergier, CISSP.
Alexandre Ouaknine, Architecte Système Senior.

Alexandre Ouaknine, Architecte Système Senior.

 

Consultant for more than 20 years, Alexandre has occupied the positions of system architect, system administrator and network, expert in cyber security and IoT architect in many high-level companies.

During this period, he supported a variety of complex networks, consisting of a multitude of operating system versions, including UNIX and Windows systems. Focused on problem solving and customer service, Alexandre is an excellent teacher. Capable of anticipating the needs of customers over the long term, it proposes solutions-changes-improvements to be ready for any eventuality.

Alexandre’s principles: simplify IT tasks so that they are as fluid as possible for people partially computer-literate and ensure that the network has a positive impact on productivity.

LinkedIn

Cyrille Aubergier, CISSP.

Cyrille Aubergier, CISSP.


Expert and senior analyst in the field of network, systems and infrastructure security.

Professional in computer security for 20 years, experience in the areas of network monitoring (SOC and SIEM), legal compliance and digital surveys, but also in the field of digital surveys. Cyrille has a good ability to read and learn, while being able to adapt to changes or contexts.

LinkedIn

NEWSLETTER

Join our news bulletin:

Sign me up now!

Testimonials

I had the pleasure to work with Alexander at Genetec. Alexander has always demonstrated a great level of honesty and integrity in his work and was able on several occasions to help me solve complex IT related concerns and come up with wokable long term solutions. He has a great personality, he is very polite and really a pleasure to work with. He strives to give total client satisfaction in the execution of his work. He is extremely knowledgable in IT and always eager to learn new things. I wish Alexandre all the best of luck in his future endeavours and will miss his interesting conversations.

Éric Jacobs, Bid Manager at Genetec.

Alexandre is a passionate worker in his domain. He has great aptitudes and always try to deliver the best solution for his customers. I had the opportunity to work with him on different projects and on multiple occasions he was the one who brought great ideas to the table and made the delivery successful.

Alexei Goldman, Dynamics x/CRM Specialist | SOA Architect | Skilled Developer.

Alexandre is an honest, well-spoken and respectful person. He has excellent communication skills and works well in a fast-paced environment and under pressure. I have had the pleasure to work closely with Alexandre on various projects, network administration, virtualization, security, backup systems, disaster recovery, certificates, terminal services. Alexandre has knowledge in both Azure and on premise environments. He has a very strong grasp of the technology. He helps relay technical information to customers in an accessible way. Alexandre is a valuable person and has rare skills that make me recommend him for any company.

Shady Kaaky, ERP System Manager at Genetec.

I’ve worked with Alexandre for about a year in a fast-paced and challenging environment. Since the beginning he was always very approachable and would answer any questions promptly. His in-depth knowledge and experience with SANs, backup systems, Microsoft systems such as Azure, Windows Server, Exchange, Office365, AD, ADFS, WAP, DNS, DHCP, IIS, Certificate Services, GPOs and virtualization environments such as Hyper V and VMware will leave you in awe. He is an expert in his field and was always sought out for everything from large project initiatives to routine support calls. When faced with multiple options, Alexandre would always listen to others’ opinions to determine the best course of action. He was always available to resolve the most complex issues. He’s an outstanding person and one of the nicest people you’ll ever meet.

Carlos Arias, Network Services Professional.

I have worked with Cyrille for around 11 years and I can confidently mention that he is an expert into Network Security domain. He has worked on different security related projects and proved his caliber on multiple occasions by providing solutions for some complex issues. He is also a very good human being and has mentored peers on multiple topics. I highly recommend Cyrille for Security related assignments. We truly miss his company and knowledge and I wish him a great career ahead.

Raman Nanda, Manager – Security Operations Centre CISSP | CISM | GCIH | CEH | ISO 27K LA

Cyrille have great knowledge in security. He has a very constructive and pragmatic approach. He can work in confidential environment and in transversal projects. It’s the Guy to have in your project if you care of security!

Pascal Nourry, Head of Network Security Team at Orange.

Cyrille is a passionate security analyst with an in-depth knowledge of network security monitoring topics like IDS/IPS and SIEM, used to work in multicultural environments. He is also well versed in legal interceptions matters on different technologies and for different legislations. Since I first met him, he effectively developed skills related to digital forensics and investigations for which he developed course materials for teaching. He is always willing to and engaged in sharing his knowledge and passion.

Vincent Melin, Security Expert at Orange.

When you find excellent network security competences as long as exceptionnal human qualities…no doubt that working with Cyrille was a pleasure.

Éric Edelstein, Security Intelligence & Threat Management Director at Orange Cyberdefense.

Cyrille Aubergier is an excellent Security Analyst who was a pleasure to work with. He is methodical and detailed, always willing to share knowledge.

It’s my absolute pleasure to recommend Alexandre Ouaknine. Alexandre and I worked together at Quebecor and Genetec, where I was his manager and direct supervisor. I thoroughly enjoyed my time working with Alexandre, and came to know him as a truly valuable asset. Along with his undeniable talent, Alexandre has always been an absolute joy to work with. He is a true team player, and always manages to foster positive discussions and bring the best out of other employees.

Marc-André Giroux, Gestionnaire, infrastructure et sécurité TI chez Genetec.

The course CF200 “Perquisition d’une transaction electronique” presented the different electronic transactions that can take place in our modern society, like online commerce, bank transactions, online auctions, money transfers etc., and the various frauds that could accompany these deals. The course gave us also a deep insight into emerging industries like FinTech and the new challenges that come with this development. Cyrille not only presented comprehensive details about the transactions and the technologies used, but also showed an excellent understanding of the internals of various operating systems and transaction related applications. Along with these insights, he presented real life techniques and tools that can be used to retrieve various electronic evidence in relation with performed commercial or financial activities. The course provided by Cyrille allowed me to acquire and develop real life skills and knowledge in the field of digital forensics.

Constantin Lazar, Network Administrator at CDI College Anjou Campus.

VIDEOS

CONTACT