{"id":72,"date":"2021-06-23T16:47:33","date_gmt":"2021-06-23T14:47:33","guid":{"rendered":"https:\/\/anehtaconseil.com\/?page_id=72"},"modified":"2021-06-28T16:24:36","modified_gmt":"2021-06-28T14:24:36","slug":"securite-terminaux-mobiles-audit-de-securite-pentest","status":"publish","type":"page","link":"https:\/\/anehtaconseil.com\/index.php\/securite-terminaux-mobiles-audit-de-securite-pentest\/","title":{"rendered":"Securit\u00e9"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>La s\u00e9curit\u00e9 des donn\u00e9es de votre organisation est un point critique dont vous devez prendre soin. <\/p>\n\n\n\n<p>De nombreuses menaces apparaissent chaque jour, sous de multiples facettes. <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"917\" height=\"600\" src=\"https:\/\/anehtaconseil.com\/wp-content\/uploads\/2021\/06\/securiteinformatique_917x600_d_0.jpg\" alt=\"\" class=\"wp-image-261\" srcset=\"https:\/\/anehtaconseil.com\/wp-content\/uploads\/2021\/06\/securiteinformatique_917x600_d_0.jpg 917w, https:\/\/anehtaconseil.com\/wp-content\/uploads\/2021\/06\/securiteinformatique_917x600_d_0-300x196.jpg 300w, https:\/\/anehtaconseil.com\/wp-content\/uploads\/2021\/06\/securiteinformatique_917x600_d_0-768x503.jpg 768w\" sizes=\"(max-width: 917px) 100vw, 917px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>Notre pratique de la s\u00e9curisation des infrastructures r\u00e9seaux, syst\u00e8mes et des terminaux utilisateurs nous permet de vous proposer une approche globale et coh\u00e9rente de votre s\u00e9curit\u00e9. <\/p>\n\n\n\n<p>A ce titre, nous pouvons vous proposer de nombreux services : <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Services de conseil : Audit de s\u00e9curit\u00e9 fonctionnel, organisation de la cellule s\u00e9curit\u00e9, assistance MOE\/MOA<\/li><li>Services de tests de p\u00e9n\u00e9tration : Sites Web, R\u00e9seau, Wifi, Serveurs, postes de travail, <\/li><li>Services de s\u00e9curisation : Terminaux Mobile (MobileIron  Threat Defense, Lookout, Checkpoint Sandblast), Acc\u00e8s aux applications cloud (Compliance, Mobileiron Access, Zero SignOn). <\/li><li>Formation \u00e0 la CyberS\u00e9curit\u00e9. <\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>La s\u00e9curit\u00e9 des donn\u00e9es de votre organisation est un point critique dont vous devez prendre soin. De nombreuses menaces apparaissent chaque jour, sous de multiples facettes. Notre pratique de la s\u00e9curisation des infrastructures r\u00e9seaux, syst\u00e8mes et des terminaux utilisateurs nous permet de vous proposer une approche globale et coh\u00e9rente de votre s\u00e9curit\u00e9. A ce titre, &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/anehtaconseil.com\/index.php\/securite-terminaux-mobiles-audit-de-securite-pentest\/\" class=\"more-link\">Continuer la lecture <span class=\"screen-reader-text\"> \u00ab\u00a0Securit\u00e9\u00a0\u00bb<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-72","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/anehtaconseil.com\/index.php\/wp-json\/wp\/v2\/pages\/72","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/anehtaconseil.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/anehtaconseil.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/anehtaconseil.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/anehtaconseil.com\/index.php\/wp-json\/wp\/v2\/comments?post=72"}],"version-history":[{"count":6,"href":"https:\/\/anehtaconseil.com\/index.php\/wp-json\/wp\/v2\/pages\/72\/revisions"}],"predecessor-version":[{"id":265,"href":"https:\/\/anehtaconseil.com\/index.php\/wp-json\/wp\/v2\/pages\/72\/revisions\/265"}],"wp:attachment":[{"href":"https:\/\/anehtaconseil.com\/index.php\/wp-json\/wp\/v2\/media?parent=72"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}