Our services
Are you an essential or major service operator who needs to comply with NIS2? Our certified experts will support you throughout the compliance process. From Gap Analysis to implementing the required measures.
Based on international standards such as ISO, the security audit of all or part of your IS, provides you with a report that includes your strengths and especially your weaknesses with a clear and feasible action plan.
Our services range from Gap Analysis to identify areas of improvement in order to obtain certification, in accordance with the implementation of ISO27001/02/05 standards.
Performing a pen test allows you to verify the effectiveness of the processes and protection in place. The pen test is being performed on both internal and external assets.
Contact us for more information about our complete catalog of penetration tests. (Black Box, White Box, phishing, wifi….).
The transition to M0365 requires the implementation of security policies. We carry out specific security audits on the Exchanges, Sharepoint, Onedrive and Azure areas.
Security management of your IT and OT environment in service mode 24/7
- Vulnerability scanning as a service
- NDR as a service
- EDR/XDR as a service
- SOC as a service
Project management requires specific skills.
In addition to knowing the project management methods (ITIL, Prince2..), often a specific knowledge of the deployed solution is required. Whether it is for solution or process implementation projects, our experts are there to support you.
A certified CISO will assist you in defining the security of all your assets. Our consultants have a very good knowledge of the ISO 27001 standard, which they use to define the right security policies for your company. For more information, please do not hesitate to contact us.
How to start a managed security project?
You want to entrust the security of your assets to a service provider? We can help you to set up your project from A to Z, from conception to completion. This way, we ensure that all the services put in place meet your needs.
Implementation of a Cyber resilience policy with action plans to respond to attacks (phishing, Ransomware…) Our teams accompany you to react quickly on a cyber-attack on your systems.