<br />
<b>Notice</b>:  Function _load_textdomain_just_in_time was called <strong>incorrectly</strong>. Translation loading for the <code>check-email</code> domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the <code>init</code> action or later. Please see <a href="https://developer.wordpress.org/advanced-administration/debug/debug-wordpress/">Debugging in WordPress</a> for more information. (This message was added in version 6.7.0.) in <b>/var/www/clients/client9/web19/web/wp-includes/functions.php</b> on line <b>6131</b><br />
{"id":804,"date":"2021-04-07T16:46:18","date_gmt":"2021-04-07T20:46:18","guid":{"rendered":"http:\/\/eoniasolutions.com\/services-de-cybersecurite\/"},"modified":"2021-06-18T11:09:19","modified_gmt":"2021-06-18T15:09:19","slug":"services-de-cybersecurite","status":"publish","type":"page","link":"https:\/\/eoniasolutions.com\/fr\/services-de-cybersecurite\/","title":{"rendered":"Services de cybers\u00e9curit\u00e9"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; module_id=\u00a0\u00bbparitucle-intro\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#0c71c3&Prime; background_image=\u00a0\u00bbhttp:\/\/eoniasolutions.com\/wp-content\/uploads\/2021\/03\/code-numerique.jpg\u00a0\u00bb background_blend=\u00a0\u00bbsoft-light\u00a0\u00bb custom_padding=\u00a0\u00bb150px||150px||true|false\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.9.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.9.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb header_font=\u00a0\u00bb|700|||||||\u00a0\u00bb header_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb header_font_size=\u00a0\u00bb52px\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb]<\/p>\n<h1>Services de cybers\u00e9curit\u00e9<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font_size=\u00a0\u00bb18px\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb]Obtenez des r\u00e9sultats significatifs en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es plus rapidement que vous ne le pensiez possible.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_2_font_size=\u00a0\u00bb25px\u00a0\u00bb header_4_font_size=\u00a0\u00bb19px\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb]<\/p>\n<p>Des serveurs sur place aux applications cloud critiques, toute votre infrastructure technologique doit \u00eatre s\u00e9curis\u00e9e \u00e0 tout prix. <strong>Eonia est votre partenaire expert en cybers\u00e9curit\u00e9.<\/strong> Nous aidons les chefs d\u2019entreprise \u00e0 relever les d\u00e9fis en mati\u00e8re de s\u00e9curit\u00e9 en raison de la p\u00e9nurie de comp\u00e9tences, des migrations dans le cloud et du passage rapide \u00e0 la d\u00e9tection et aux r\u00e9ponses. Nous pouvons aider votre entreprise \u00e0 passer de l\u2019approche r\u00e9active traditionnelle \u00e0 une strat\u00e9gie de s\u00e9curit\u00e9 plus coh\u00e9rente et proactive. Nous vous donnons un aper\u00e7u essentiel de votre <strong>position actuelle en mati\u00e8re de s\u00e9curit\u00e9 <\/strong>gr\u00e2ce \u00e0 des examens, des diagnostics et des audits de votre protection des donn\u00e9es, de la s\u00e9curit\u00e9 de vos information, de votre infrastructure essentielle et de vos technologies afin de soutenir les politiques strat\u00e9giques organisationnelles.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font_size=\u00a0\u00bb22px\u00a0\u00bb link_text_color=\u00a0\u00bb#0C71C3&Prime;]<\/p>\n<p style=\"text-align: center;\">Commencer d\u00e8s aujourd\u2019hui avec une consultation gratuite[\/et_pb_text][et_pb_button button_url=\u00a0\u00bbhttps:\/\/eoniasolutions.com\/fr\/contactez-nous\/\u00a0\u00bb button_text=\u00a0\u00bbContactez-nous\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_color=\u00a0\u00bb#0c71c3&Prime;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; module_class=\u00a0\u00bbgOverlay\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb use_background_color_gradient=\u00a0\u00bbon\u00a0\u00bb background_color_gradient_start=\u00a0\u00bbrgba(0,0,0,0.24)\u00a0\u00bb background_color_gradient_end=\u00a0\u00bbrgba(0,0,0,0.21)\u00a0\u00bb background_color_gradient_overlays_image=\u00a0\u00bbon\u00a0\u00bb background_image=\u00a0\u00bbhttp:\/\/eoniasolutions.com\/wp-content\/uploads\/2021\/04\/network-design.jpg\u00a0\u00bb parallax=\u00a0\u00bbon\u00a0\u00bb parallax_method=\u00a0\u00bboff\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h2>Nos services de cybers\u00e9curit\u00e9<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb module_class=\u00a0\u00bbss_row_align_buttons\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; module_class=\u00a0\u00bbhvr-shutter-in-horizontal service-boxes \u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_text module_id=\u00a0\u00bbRansomware\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb width=\u00a0\u00bb93%\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb custom_padding=\u00a0\u00bb15px||||false|false\u00a0\u00bb]<\/p>\n<h3>\u00c9valuation de la pr\u00e9paration aux logiciels d&rsquo;extorsion<\/h3>\n<p>Eonia Solutions offre une \u00e9valuation approfondie de la pr\u00e9paration aux logiciels d&rsquo;extorsion pour vous aider \u00e0 renforcer vos d\u00e9fenses contre ces types d&rsquo;attaques furtifs, aveugles, et tr\u00e8s dommageable.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00a0\u00bbhttps:\/\/eoniasolutions.com\/fr\/ransomware-evaluation-de-la-preparation\/\u00a0\u00bb button_text=\u00a0\u00bbPour en savoir plus\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb16px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#0C71C3&Prime; button_border_width=\u00a0\u00bb3px\u00a0\u00bb button_border_color=\u00a0\u00bb#0C71C3&Prime; button_border_radius=\u00a0\u00bb0px\u00a0\u00bb button_font=\u00a0\u00bb|600|||||||\u00a0\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; module_class=\u00a0\u00bbhvr-shutter-in-horizontal service-boxes \u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_text module_id=\u00a0\u00bbsecurity-posture-assessment\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb custom_padding=\u00a0\u00bb15px||||false|false\u00a0\u00bb]<\/p>\n<h3>\u00c9valuation de la posture de cybers\u00e9curit\u00e9<\/h3>\n<p>Effectuez une \u00e9valuation de la posture de s\u00e9curit\u00e9 de vos syst\u00e8mes et des diff\u00e9rentes pratiques afin d\u2019identifier les risques et les zones de faiblesse. Nos sp\u00e9cialistes de la s\u00e9curit\u00e9 effectueront un examen approfondi de vos syst\u00e8mes et infrastructures informatiques.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00a0\u00bbhttps:\/\/eoniasolutions.com\/fr\/evaluation-de-la-posture-de-cybersecurite\/\u00a0\u00bb button_text=\u00a0\u00bbPour en savoir plus\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb16px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#0C71C3&Prime; button_border_width=\u00a0\u00bb3px\u00a0\u00bb button_border_color=\u00a0\u00bb#0C71C3&Prime; button_border_radius=\u00a0\u00bb0px\u00a0\u00bb button_font=\u00a0\u00bb|600|||||||\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb module_class=\u00a0\u00bbss_row_align_buttons\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb28px||28px||true|\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; module_id=\u00a0\u00bbsecurity-posture-assessment\u00a0\u00bb module_class=\u00a0\u00bbservice-boxes hvr-shutter-in-horizontal\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb15px|15px|15px|15px|false|false\u00a0\u00bb border_color_all=\u00a0\u00bbRGBA(0,0,0,0)\u00a0\u00bb][et_pb_text module_id=\u00a0\u00bbnetwork-vulnerability\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb]<\/p>\n<h3>  \u00c9valuation de la vuln\u00e9rabilit\u00e9  <\/h3>\n<div class=\"separateur\"><\/div>\n<p><span>Notre \u00e9valuation de la vuln\u00e9rabilit\u00e9 d\u00e9terminera quels syst\u00e8mes critiques et informations sensibles risquent d\u2019\u00eatre compromis ou attaqu\u00e9s.<\/span><\/p>\n<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00a0\u00bbhttps:\/\/eoniasolutions.com\/fr\/gestion-des-vulnerabilites\/\u00a0\u00bb button_text=\u00a0\u00bbPour en savoir plus\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb16px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#0C71C3&Prime; button_border_width=\u00a0\u00bb3px\u00a0\u00bb button_border_color=\u00a0\u00bb#0C71C3&Prime; button_border_radius=\u00a0\u00bb0px\u00a0\u00bb button_font=\u00a0\u00bb|600|||||||\u00a0\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; module_id=\u00a0\u00bbnetwork-vulnerability\u00a0\u00bb module_class=\u00a0\u00bbservice-boxes hvr-shutter-in-horizontal\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb15px|15px|15px|15px|true|true\u00a0\u00bb border_color_all=\u00a0\u00bbrgba(0,0,0,0.39)\u00a0\u00bb][et_pb_text module_id=\u00a0\u00bbmanaged-endpoint\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb]<\/p>\n<h3>D\u00e9tection et r\u00e9ponse des points de terminaison g\u00e9r\u00e9s<\/h3>\n<p>Les plateformes de d\u00e9tection et de r\u00e9ponse des terminaux (EDR) sont une cat\u00e9gorie d\u2019outils de s\u00e9curit\u00e9 de point de terminaison, con\u00e7us pour fournir une visibilit\u00e9 des terminaux et sont utilis\u00e9s pour d\u00e9tecter et r\u00e9pondre aux cybermenaces et aux exploits<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00a0\u00bbhttps:\/\/eoniasolutions.com\/fr\/detection-et-reponse-gerees\/\u00a0\u00bb button_text=\u00a0\u00bbPour en savoir plus\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb16px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#0C71C3&Prime; button_border_width=\u00a0\u00bb3px\u00a0\u00bb button_border_color=\u00a0\u00bb#0C71C3&Prime; button_border_radius=\u00a0\u00bb0px\u00a0\u00bb button_font=\u00a0\u00bb|600|||||||\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb module_class=\u00a0\u00bbss_row_align_buttons\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb28px||28px||true|\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; module_id=\u00a0\u00bbmanaged-email\u00a0\u00bb module_class=\u00a0\u00bbservice-boxes hvr-shutter-in-horizontal\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb15px|15px|15px|15px|false|false\u00a0\u00bb border_color_all=\u00a0\u00bbRGBA(0,0,0,0)\u00a0\u00bb][et_pb_text module_id=\u00a0\u00bbThreatHunting\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.7&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb width=\u00a0\u00bb95%\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb custom_padding=\u00a0\u00bb15px||||false|false\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; sticky_enabled=\u00a0\u00bb0&Prime;]<\/p>\n<h3>Services de d\u00e9tection de menaces<\/h3>\n<p>Les services de d\u00e9tection de menaces d&rsquo;Eonia peuvent aider votre entreprise \u00e0 rechercher des activit\u00e9s malveillantes non d\u00e9tect\u00e9es \u00e0 l\u2019int\u00e9rieur de votre r\u00e9seau.<br \/>Lors d&rsquo;un engagement de d\u00e9tection de menaces, nous examinerons ce qui quitte votre r\u00e9seau, comme les requ\u00eates DNS et les informations de connexion.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; module_id=\u00a0\u00bbvciso\u00a0\u00bb module_class=\u00a0\u00bbservice-boxes hvr-shutter-in-horizontal\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb15px|15px|15px|15px|true|true\u00a0\u00bb border_color_all=\u00a0\u00bbrgba(0,0,0,0.39)\u00a0\u00bb][et_pb_text module_id=\u00a0\u00bbmanaged-email\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb]<\/p>\n<h3>Gestion de la <br \/>s\u00e9curit\u00e9 de courriels<\/h3>\n<p>91% de toutes les cyberattaques commencent par un e-mail! L\u2019e-mail est le principal point d\u2019entr\u00e9e pour la plupart des cyber-attaques car c\u2019est le point d\u2019entr\u00e9e de donn\u00e9es de volume le plus \u00e9lev\u00e9. Il est tr\u00e8s efficace parce qu\u2019il peut \u00eatre cibl\u00e9 et personnalis\u00e9 pour augmenter les chances d\u2019exploitation.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00a0\u00bbhttps:\/\/eoniasolutions.com\/fr\/securite-par-courriel\/\u00a0\u00bb button_text=\u00a0\u00bbPour en savoir plus\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb16px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#0C71C3&Prime; button_border_width=\u00a0\u00bb3px\u00a0\u00bb button_border_color=\u00a0\u00bb#0C71C3&Prime; button_border_radius=\u00a0\u00bb0px\u00a0\u00bb button_font=\u00a0\u00bb|600|||||||\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; module_id=\u00a0\u00bbtest-d-intrusion\u00a0\u00bb module_class=\u00a0\u00bbgOverlay\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb use_background_color_gradient=\u00a0\u00bbon\u00a0\u00bb background_color_gradient_start=\u00a0\u00bbrgba(0,0,0,0.24)\u00a0\u00bb background_color_gradient_end=\u00a0\u00bbrgba(0,0,0,0.21)\u00a0\u00bb background_color_gradient_overlays_image=\u00a0\u00bbon\u00a0\u00bb background_image=\u00a0\u00bbhttp:\/\/eoniasolutions.com\/wp-content\/uploads\/2021\/04\/password-2.jpg\u00a0\u00bb parallax=\u00a0\u00bbon\u00a0\u00bb parallax_method=\u00a0\u00bboff\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h2>Test d&rsquo;intrusion<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb module_class=\u00a0\u00bbss_row_align_buttons\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb28px||28px||true|\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; module_id=\u00a0\u00bbexternal-penetration\u00a0\u00bb module_class=\u00a0\u00bbservice-boxes hvr-shutter-in-horizontal\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb15px|15px|15px|15px|false|false\u00a0\u00bb border_color_all=\u00a0\u00bbRGBA(0,0,0,0)\u00a0\u00bb][et_pb_text module_id=\u00a0\u00bbexternal-penetration\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb]<\/p>\n<h3>Tests d&rsquo;intrusion externe<\/h3>\n<p>Laissez-nous vous montrer \u00e0 quel point vos syst\u00e8mes sont vuln\u00e9rables face au public. Dans le cadre de ce mandat, nous v\u00e9rifions tous vos syst\u00e8mes publics face aux vuln\u00e9rabilit\u00e9s et aux exploits.[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; module_id=\u00a0\u00bbinternal-penetration\u00a0\u00bb module_class=\u00a0\u00bbservice-boxes hvr-shutter-in-horizontal\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb15px|15px|15px|15px|true|true\u00a0\u00bb border_color_all=\u00a0\u00bbRGBA(0,0,0,0)\u00a0\u00bb][et_pb_text module_id=\u00a0\u00bbinternal-penetration\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb]<\/p>\n<h3>Tests d&rsquo;intrusion interne<\/h3>\n<p>Au cours de cet engagement, nous effectuons des analyses de port, des analyses de vuln\u00e9rabilit\u00e9 et des tests pour tous les ordinateurs, p\u00e9riph\u00e9riques, serveurs internes et \u00e9quipements r\u00e9seau internes.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb module_class=\u00a0\u00bbss_row_align_buttons\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb28px||28px||true|\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; module_id=\u00a0\u00bbdata-exfiltration\u00a0\u00bb module_class=\u00a0\u00bbservice-boxes hvr-shutter-in-horizontal\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb15px|15px|15px|15px|false|false\u00a0\u00bb border_color_all=\u00a0\u00bbRGBA(0,0,0,0)\u00a0\u00bb][et_pb_text module_id=\u00a0\u00bbweb-application-penetration\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb]<\/p>\n<h3>Tests d&rsquo;intrusion d\u2019applications Web<\/h3>\n<p>Nous effectuons une \u00e9valuation des applications Web pour trouver les vuln\u00e9rabilit\u00e9s caus\u00e9es par les erreurs de programmation et la configuration.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; module_class=\u00a0\u00bbservice-boxes hvr-shutter-in-horizontal\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb15px|15px|15px|15px|true|true\u00a0\u00bb border_color_all=\u00a0\u00bbrgba(0,0,0,0.39)\u00a0\u00bb][et_pb_text module_id=\u00a0\u00bbdata-exfiltration\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb]<\/p>\n<h3>Tests de commandement et de contr\u00f4le et d\u2019exfiltration de donn\u00e9es<\/h3>\n<p>Lors d\u2019une \u00e9valuation C2, nos testeurs d&rsquo;instrusion \u00e9tudieront et testeront votre capacit\u00e9 \u00e0 d\u00e9tecter les canaux de commande dans le contr\u00f4le au sein de votre r\u00e9seau. Ils verront \u00e9galement si vous \u00eates en mesure d\u2019emp\u00eacher divers logiciels malveillants d\u2019ex\u00e9cuter au sein de votre r\u00e9seau et de tester si vous \u00eates en mesure d\u2019emp\u00eacher les donn\u00e9es de quitter votre entreprise<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.9.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_enable_color=\u00a0\u00bboff\u00a0\u00bb custom_padding=\u00a0\u00bb46px||46px||true|\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.9.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_enable_color=\u00a0\u00bboff\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bb|||on|||||\u00a0\u00bb text_text_color=\u00a0\u00bb#0C71C3&Prime; text_font_size=\u00a0\u00bb24px\u00a0\u00bb link_text_color=\u00a0\u00bb#0C71C3&Prime; text_orientation=\u00a0\u00bbcenter\u00a0\u00bb link_option_url=\u00a0\u00bbhttps:\/\/eoniasolutions.com\/fr\/contactez-nous\/#form\u00a0\u00bb]<\/p>\n<p><a href=\"https:\/\/eoniasolutions.com\/fr\/contactez-nous\/\">Appelez-nous pour voir nos plans de cybers\u00e9curit\u00e9 et de s\u00e9curit\u00e9<\/a><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00a0\u00bbhttps:\/\/eoniasolutions.com\/fr\/contactez-nous\/\u00a0\u00bb button_text=\u00a0\u00bbContactez-nous\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.9.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_color=\u00a0\u00bb#0c71c3&Prime;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Services de cybers\u00e9curit\u00e9Obtenez des r\u00e9sultats significatifs en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es plus rapidement que vous ne le pensiez possible.Des serveurs sur place aux applications cloud critiques, toute votre infrastructure technologique doit \u00eatre s\u00e9curis\u00e9e \u00e0 tout prix. Eonia est votre partenaire expert en cybers\u00e9curit\u00e9. Nous aidons les chefs d\u2019entreprise \u00e0 relever les d\u00e9fis en mati\u00e8re [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-804","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/eoniasolutions.com\/fr\/wp-json\/wp\/v2\/pages\/804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eoniasolutions.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/eoniasolutions.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/eoniasolutions.com\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/eoniasolutions.com\/fr\/wp-json\/wp\/v2\/comments?post=804"}],"version-history":[{"count":51,"href":"https:\/\/eoniasolutions.com\/fr\/wp-json\/wp\/v2\/pages\/804\/revisions"}],"predecessor-version":[{"id":1985,"href":"https:\/\/eoniasolutions.com\/fr\/wp-json\/wp\/v2\/pages\/804\/revisions\/1985"}],"wp:attachment":[{"href":"https:\/\/eoniasolutions.com\/fr\/wp-json\/wp\/v2\/media?parent=804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}