{"id":35,"date":"2023-07-31T10:48:46","date_gmt":"2023-07-31T10:48:46","guid":{"rendered":"https:\/\/soc.ticanalyse.org\/?page_id=35"},"modified":"2026-03-25T08:50:43","modified_gmt":"2026-03-25T08:50:43","slug":"accueil","status":"publish","type":"page","link":"https:\/\/soc.ticanalyse.org\/en\/","title":{"rendered":"Home"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"35\" class=\"elementor elementor-35\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-d890693 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default\" data-id=\"d890693\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-285bbc5\" data-id=\"285bbc5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-387af71 elementor-widget elementor-widget-heading\" data-id=\"387af71\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Operations Center (SOC)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a99db39 elementor-widget elementor-widget-heading\" data-id=\"a99db39\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Security is not an option!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-707de7e elementor-widget elementor-widget-heading\" data-id=\"707de7e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect your organisation against security threats with our state-of-the-art SOC.\n\n\n\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a39a27e\" data-id=\"a39a27e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eabfa5c elementor-widget elementor-widget-image\" data-id=\"eabfa5c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"799\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/soc-ticanalyse.png\" class=\"attachment-large size-large wp-image-197\" alt=\"\" srcset=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/soc-ticanalyse.png 1024w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/soc-ticanalyse-300x300.png 300w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/soc-ticanalyse-150x150.png 150w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/soc-ticanalyse-768x767.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-aa6bee7 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"aa6bee7\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2afe5d0\" data-id=\"2afe5d0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-31eec24 elementor-widget elementor-widget-heading\" data-id=\"31eec24\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our mission is to provide you with high-quality IT security. <br> End-to-end protection for organisations of all sizes.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-8f7e1e0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8f7e1e0\" data-element_type=\"section\" id=\"presentation\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6338b7b\" data-id=\"6338b7b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-f756992 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f756992\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-942ca75\" data-id=\"942ca75\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-282a1b1\" data-id=\"282a1b1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d88d94b elementor-widget elementor-widget-heading\" data-id=\"d88d94b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Presentation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53ef50d elementor-widget elementor-widget-heading\" data-id=\"53ef50d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A Security Operations Center (SOC) manages the security and compliance of an organisation's IT systems. At TICANALYSE, we offer a SOC as a service that monitors security threats in real time, detects incidents, analyses security events and provides a rapid and effective response to security incidents.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-807476d\" data-id=\"807476d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-ccdedc5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ccdedc5\" data-element_type=\"section\" id=\"expertises\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0efc245\" data-id=\"0efc245\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30557e5 elementor-widget elementor-widget-heading\" data-id=\"30557e5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">EXPERTISE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8a608b elementor-widget elementor-widget-heading\" data-id=\"d8a608b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our SOC as a service offers a number of features, including :<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-f7d65da elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f7d65da\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d7be850\" data-id=\"d7be850\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b1f205 elementor-widget elementor-widget-eael-feature-list\" data-id=\"3b1f205\" data-element_type=\"widget\" data-widget_type=\"eael-feature-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"-icon-position-left -tablet-icon-position-left -mobile-icon-position-top\">\n\t\t\t<ul id=\"eael-feature-list-3b1f205\" class=\"eael-feature-list-items circle stacked  eael-feature-list-vertical\" data-layout-tablet=\"vertical\" data-layout-mobile=\"vertical\">\n\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-34b6d6f\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-0\">\n\n\t\t<img decoding=\"async\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/07\/surveillance.png\" class=\"eael-feature-list-img\" alt=\"\">\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">Real-time monitoring<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Our security team constantly monitors security activities for potential threats.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-a091e91\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-1\">\n\n\t\t<img decoding=\"async\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/07\/bug-1.png\" class=\"eael-feature-list-img\" alt=\"\">\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">Threat detection<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">We use advanced threat detection tools to identify security threats as soon as they occur.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-b187e82\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-2\">\n\n\t\t<img decoding=\"async\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/07\/securit.png\" class=\"eael-feature-list-img\" alt=\"\">\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">Response to security incidents<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Our security team is ready to respond quickly to manage security incidents and minimise disruption to your business.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-e9504f1\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-3\">\n\n\t\t<img decoding=\"async\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/07\/search-results.png\" class=\"eael-feature-list-img\" alt=\"\">\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">Analysis of security events<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">We analyse security events to identify trends and patterns of suspicious behaviour.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-6d5e46c\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-4\">\n\n\t\t<img decoding=\"async\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/07\/monitor.png\" class=\"eael-feature-list-img\" alt=\"\">\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">Safety reports<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">We provide regular security reports to help you understand the security threats facing your business and the measures we have taken to address them.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f8cd196\" data-id=\"f8cd196\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71525eb elementor-widget elementor-widget-image\" data-id=\"71525eb\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/SOC-10_Plan-de-travail-1-1024x1024.png\" class=\"attachment-large size-large wp-image-210\" alt=\"\" srcset=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/SOC-10_Plan-de-travail-1-1024x1024.png 1024w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/SOC-10_Plan-de-travail-1-300x300.png 300w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/SOC-10_Plan-de-travail-1-150x150.png 150w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/SOC-10_Plan-de-travail-1-768x768.png 768w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/SOC-10_Plan-de-travail-1-1536x1536.png 1536w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/SOC-10_Plan-de-travail-1.png 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-4832022 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4832022\" data-element_type=\"section\" id=\"services\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2c2ace3\" data-id=\"2c2ace3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-77f98ae elementor-widget elementor-widget-heading\" data-id=\"77f98ae\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-92d7235 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"92d7235\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ae17d25\" data-id=\"ae17d25\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-575cbb0 elementor-widget elementor-widget-heading\" data-id=\"575cbb0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Intrusion test<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56786e3 elementor-widget elementor-widget-text-editor\" data-id=\"56786e3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our penetration testing service allows you to test the robustness of your IT infrastructure by simulating targeted attacks. Our IT security experts use advanced methods to identify vulnerabilities in your network, applications and systems, to help you strengthen your cyber security posture.<\/p><p>Penetration tests are designed to help you assess the effectiveness of your security teams. We try to identify possible security problems that could lead to the leakage of sensitive information or to a situation where a malicious user, without the appropriate authorisations, could gain access to sensitive information. Our penetration testing activities fall into one of the following categories:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-6dc3161 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6dc3161\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5a91933\" data-id=\"5a91933\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c9e1804 elementor-widget elementor-widget-accordion\" data-id=\"c9e1804\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2111\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2111\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Black box penetration testing<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2111\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2111\"><p>This is a classic case of verifying a company's security posture by emulating an external attacker attempting to gain unauthorised access to the system. Other activities include attempts to interfere with web application users or impact the system in some other negative way.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2112\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2112\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">White box penetration testing<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2112\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2112\"><p>The objective of a white-box test is to increase the detection rate of the number of hidden vulnerabilities. Performing a white-box security assessment allows a tester to go further and find vulnerabilities in the target environment and the application's source code.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2113\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2113\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Grey box penetration test<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2113\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2113\"><p>Combining black-box and white-box technics, the grey-box penetration test is used to check a company's vulnerability to insider attacks. This test simulates an attacker who already has some knowledge of the workings of the company. It takes less time and is more cost-effective than the black box test.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b5ad683\" data-id=\"b5ad683\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fdb2b0a elementor-widget elementor-widget-image\" data-id=\"fdb2b0a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/hacking1.png\" class=\"attachment-large size-large wp-image-529\" alt=\"\" srcset=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/hacking1.png 512w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/hacking1-300x300.png 300w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/hacking1-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-eccf997 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eccf997\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-139da9b\" data-id=\"139da9b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-88cbc3a elementor-widget elementor-widget-heading\" data-id=\"88cbc3a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerability assessment<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7b36ea elementor-widget elementor-widget-text-editor\" data-id=\"d7b36ea\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Vulnerability assessment is an essential process for identifying potential vulnerabilities in your IT environment. Our team of experts carries out an in-depth analysis of your systems, networks and applications, using the latest technics. We then provide you with clear, concrete recommendations for strengthening your security and protecting your sensitive data.<\/p><p>The process:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-24ca8fb elementor-reverse-tablet elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"24ca8fb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7f6510c\" data-id=\"7f6510c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cb1a2ed elementor-widget elementor-widget-image\" data-id=\"cb1a2ed\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/security.png\" class=\"attachment-large size-large wp-image-531\" alt=\"\" srcset=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/security.png 512w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/security-300x300.png 300w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/security-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bc19660\" data-id=\"bc19660\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-39aa5f0 elementor-widget elementor-widget-accordion\" data-id=\"39aa5f0\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6041\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-6041\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Identification of assets<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-6041\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-6041\"><p>This involves identifying the critical assets that need to be protected, such as sensitive data, key infrastructure, financial resources, etc.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6042\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-6042\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Threat analysis<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-6042\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-6042\"><p>The various potential threats to which assets are exposed, such as computer attacks, natural disasters, human error, etc., need to be examined.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6043\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-6043\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Vulnerability assessment<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-6043\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-6043\"><p>Once the threats have been identified, it is necessary to determine the vulnerabilities that could be exploited by these threats. This may involve examining existing security measures, weaknesses in systems, processes or policies.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6044\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-6044\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Estimated impact<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-6044\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-6044\"><p>This involves assessing the potential impact on assets if vulnerabilities are exploited. This can include an estimate of financial losses, service interruptions, damage to reputation, etc.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6045\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-6045\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Risk prioritisation<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-6045\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-6045\"><p>Once the vulnerabilities and potential impacts have been identified, it is important to prioritise the risks according to their severity. This allows resources to be concentrated on the most critical vulnerabilities.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6046\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-6046\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Development of mitigation measures<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-6046\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-6046\"><p>Based on the results of the assessment, appropriate mitigation measures can be developed. This may include actions such as implementing additional security controls, improving policies and procedures, staff training, etc.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-2cda0e3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2cda0e3\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fd034a3\" data-id=\"fd034a3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b4b5721 elementor-widget elementor-widget-heading\" data-id=\"b4b5721\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber security policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bcb738 elementor-widget elementor-widget-text-editor\" data-id=\"1bcb738\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A sound cyber security policy is the cornerstone of any organisation that is resilient in the face of cyber threats. We can help you design and implement a cyber security policy tailored to your specific needs. Taking into account your infrastructure, processes and business objectives, we develop clear and practical guidelines to protect your digital assets and reduce risk.<\/p><p>The process:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-1660226 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1660226\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3702439\" data-id=\"3702439\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f8244d elementor-widget elementor-widget-accordion\" data-id=\"5f8244d\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1001\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1001\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Definition of the objective and scope of application<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1001\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1001\"><p>We start by clearly defining the objective of the cyber security policy. Then we specify the systems, data and users affected by the policy. We also specify the laws, regulations or security standards with which your organisation must comply.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1002\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1002\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Identifying responsibilities<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1002\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1002\"><p>We determine the cybersecurity responsibilities of the various players in the organisation. This may include the roles and responsibilities of security staff, managers, employees and end users.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1003\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1003\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">List of safety practices<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1003\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1003\"><p>We describe the specific security practices that all employees must follow. This may include using strong passwords, regularly updating software, identifying and managing vulnerabilities, classifying data, etc. We include clear and understandable guidelines.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1004\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1004\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Access and rights management<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1004\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1004\"><p>Specify how access to systems and data is to be managed. Define policies for creating, modifying and deleting user accounts. Specify the rules for using administrative privileges and managing access rights.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1005\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1005\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Incident management<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1005\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1005\"><p>Describe the procedures to be followed in the event of a security incident, such as a cyber attack, data breach or security vulnerability. Specify how incidents are to be reported, assessed, managed and resolved. Also include information on data backups and disaster recovery plans.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1006\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1006\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Awareness-raising and training<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1006\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1006\"><p>Based on the results of the assessment, appropriate mitigation measures can be developed. This may include actions such as implementing additional security controls, improving policies and procedures, staff training, etc.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1007\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-1007\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Compliance and audits<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1007\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-1007\"><p>Mention the compliance and audit procedures that will be followed to ensure compliance with cybersecurity policies. This may include regular audits, compliance assessments, security reviews and penetration tests.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1008\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-1008\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Review and update<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1008\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-1008\"><p>Specify that the cyber security policy will be regularly reviewed and updated to reflect new threats, technological changes and regulatory requirements. Also indicate the procedure to be followed for requests to amend the policy.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1c2f8a2\" data-id=\"1c2f8a2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-451acc4 elementor-widget elementor-widget-image\" data-id=\"451acc4\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/secure-data.png\" class=\"attachment-large size-large wp-image-532\" alt=\"\" srcset=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/secure-data.png 512w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/secure-data-300x300.png 300w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/secure-data-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-12114e3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"12114e3\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ead213d\" data-id=\"ead213d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ebc7715 elementor-widget elementor-widget-heading\" data-id=\"ebc7715\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Disaster recovery plan<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-448cf92 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"448cf92\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d158e74\" data-id=\"d158e74\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eacc1c8 elementor-widget elementor-widget-image\" data-id=\"eacc1c8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/data-synchronization.png\" class=\"attachment-large size-large wp-image-548\" alt=\"\" srcset=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/data-synchronization.png 512w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/data-synchronization-300x300.png 300w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/data-synchronization-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-366c1d3\" data-id=\"366c1d3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f2d8f9f elementor-widget elementor-widget-text-editor\" data-id=\"f2d8f9f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A disaster recovery plan is essential to minimize potential disruption in the event of a major incident. Our experienced team will work with you to develop a customized plan to ensure that your business can recover quickly and effectively from an adverse event. We identify critical points of failure, implement preventive measures and recovery procedures, and regularly test the validity of your plan.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-3e8e129 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3e8e129\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fe629a6\" data-id=\"fe629a6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-70f0aeb elementor-widget elementor-widget-heading\" data-id=\"70f0aeb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DIGITAL FORENSIC SCIENCE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-391bf35 elementor-widget elementor-widget-text-editor\" data-id=\"391bf35\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Digital forensic plays a key role in resolving IT security incidents and malicious activity. Our digital forensics experts use advanced technics to collect and analyze digital evidence to identify the perpetrators of attacks, fraud and other criminal activity. We also provide detailed reports and recommendations to strengthen your defence against such threats in the future.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-6cec794 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6cec794\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d1e3a1a\" data-id=\"d1e3a1a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-39f2743 elementor-widget elementor-widget-accordion\" data-id=\"39f2743\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6071\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-6071\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Collecting and analysing digital evidence<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-6071\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-6071\"><p>Digital forensic enables the collection and analysis of digital evidence from electronic devices such as computers, mobile phones, tablets, hard drives, servers, etc. We use specialized technics to extract relevant data, such as emails, files, browsing histories, metadata, activity logs, online communications and so. This digital evidence can play a vital role in identifying suspected perpetrators, reconstructing events and solving cybercrime.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6072\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-6072\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Investigating cyber attacks<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-6072\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-6072\"><p>Digital forensic is essential for investigating cyber attacks, such as computer intrusions, data theft, online fraud, phishing attacks and so. We can analyse the traces left by attackers in computer systems, such as connection records, log files, IP addresses, malicious signatures and so. These investigations enable us to identify the methods used by attackers, their motivations and the security measures to be taken to prevent future attacks.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6073\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-6073\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Preserving the integrity of digital evidence<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-6073\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-6073\"><p>Digital forensic ensures that the integrity of digital evidence is preserved throughout the investigation process. We use specialised methods and tools to ensure that digital evidence is collected in a legal, admissible and unaltered manner. This includes rigorous documentation of procedures, chain of custody of evidence, protection against contamination, creation of back-up copies and preservation of data confidentiality. Preserving the integrity of digital evidence is crucial to its valid and reliable use in court.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-de352e8\" data-id=\"de352e8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-53a443d elementor-widget elementor-widget-image\" data-id=\"53a443d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/forensics.png\" class=\"attachment-full size-full wp-image-546\" alt=\"\" srcset=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/forensics.png 512w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/forensics-300x300.png 300w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/forensics-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-f1ea65f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f1ea65f\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-299bbef\" data-id=\"299bbef\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-38b2846 elementor-widget elementor-widget-heading\" data-id=\"38b2846\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Incident response<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-68ee882 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"68ee882\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d34203f\" data-id=\"d34203f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-365e9a6 elementor-widget elementor-widget-image\" data-id=\"365e9a6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/hacking3.png\" class=\"attachment-large size-large wp-image-539\" alt=\"\" srcset=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/hacking3.png 512w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/hacking3-300x300.png 300w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/hacking3-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2395d23\" data-id=\"2395d23\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9041571 elementor-widget elementor-widget-text-editor\" data-id=\"9041571\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A disaster recovery plan is essential to minimize potential disruption in the event of a major incident. Our experienced team will work with you to develop a customized plan to ensure that your business can recover quickly and effectively from an adverse event. We identify critical points of failure, implement preventive measures and recovery procedures, and regularly test the validity of your plan.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-2bde9ab elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"2bde9ab\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b6db88a\" data-id=\"b6db88a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca531af elementor-widget elementor-widget-heading\" data-id=\"ca531af\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Real-time IT threat map<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-8b23ef5 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"8b23ef5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e55188c\" data-id=\"e55188c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-11d5c09 elementor-widget elementor-widget-shortcode\" data-id=\"11d5c09\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><iframe width=\"640\" height=\"640\" src=\"https:\/\/livethreatmap.radware.com\/\" frameborder=\"0\"><\/iframe><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-6aafe9a elementor-section-full_width elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle\" data-id=\"6aafe9a\" data-element_type=\"section\" id=\"equipe\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-40d8a8d\" data-id=\"40d8a8d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-8e28e66 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8e28e66\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e3e34b5\" data-id=\"e3e34b5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-735d1f3 elementor-widget elementor-widget-heading\" data-id=\"735d1f3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">security team<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-7974721 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7974721\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e404acd\" data-id=\"e404acd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5813f96 elementor-widget elementor-widget-text-editor\" data-id=\"5813f96\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our security team is made up of qualified and experienced IT security professionals. All our team members have specific security training and certifications and have hands-on experience in managing security incidents. We pride ourselves on our ability to provide customised security solutions to our customers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-f35ba66 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f35ba66\" data-element_type=\"section\" id=\"actualites\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4d72138\" data-id=\"4d72138\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a88b0c3 elementor-widget elementor-widget-heading\" data-id=\"a88b0c3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity news <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6690896 elementor-widget elementor-widget-upk-buzz-list\" data-id=\"6690896\" data-element_type=\"widget\" data-widget_type=\"upk-buzz-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"upk-buzz-list-container upk-ajax-grid\" data-loadmore=\"[]\">\n\t\t\t<div class=\"upk-buzz-list upk-ajax-grid-wrap\">\n\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"upk-item upk-flex upk-flex-middle\">\n\t\t\t<div class=\"upk-img-wrap\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/young-brunette-woman-lying-bed-300x200.jpg\" class=\"upk-img\" alt=\"Des hackers profitent de la nuit pour pirater votre WhatsApp\" srcset=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/young-brunette-woman-lying-bed-300x200.jpg 300w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/young-brunette-woman-lying-bed-1024x683.jpg 1024w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/young-brunette-woman-lying-bed-768x512.jpg 768w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/young-brunette-woman-lying-bed.jpg 1064w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t<\/div>\n\t\t\t<div class=\"upk-content\">\n\t\t\t\t<div class=\"upk-count\"><\/div>\n\t\t\t\t<div class=\"upk-inner\">\n\t\t\t\t\t\t\t<div class=\"upk-category\">\n\t\t\t<a href=\"https:\/\/soc.ticanalyse.org\/en\/category\/actualite\/\" \n\t\t\t\t\t\t\taria-label=\"Category Actualit\u00e9\">News<\/a>\t\t<\/div>\n\t\t\t\t\t\t<h3 class=\"upk-title\"><a href=\"https:\/\/soc.ticanalyse.org\/en\/2023\/08\/20\/des-hackers-profitent-de-la-nuit-pour-pirater-votre-whatsapp\/\" title=\"Hackers take advantage of the night to hack into your WhatsApp\" class=\"title-animation-underline\" aria-label=\"Hackers take advantage of the night to hack into your WhatsApp\">Hackers take advantage of the night to hack into your WhatsApp<\/a><\/h3>\t\t\t\t\t\t\t\t\t\t\t<div class=\"upk-meta upk-flex upk-flex-middle\">\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div data-separator=\"\/\/\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"upk-date\">\n\t\t\tAugust 20, 2023\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"upk-item upk-flex upk-flex-middle\">\n\t\t\t<div class=\"upk-img-wrap\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/unnamed-300x150.jpg\" class=\"upk-img\" alt=\"Cyberattaque par Anonymous Sudan : De nombreux services en ligne paralys\u00e9s au Kenya\" srcset=\"https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/unnamed-300x150.jpg 300w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/unnamed-1024x512.jpg 1024w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/unnamed-768x384.jpg 768w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/unnamed-1536x768.jpg 1536w, https:\/\/soc.ticanalyse.org\/wp-content\/uploads\/2023\/08\/unnamed.jpg 1600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t<\/div>\n\t\t\t<div class=\"upk-content\">\n\t\t\t\t<div class=\"upk-count\"><\/div>\n\t\t\t\t<div class=\"upk-inner\">\n\t\t\t\t\t\t\t<div class=\"upk-category\">\n\t\t\t<a href=\"https:\/\/soc.ticanalyse.org\/en\/category\/actualite\/\" \n\t\t\t\t\t\t\taria-label=\"Category Actualit\u00e9\">News<\/a>\t\t<\/div>\n\t\t\t\t\t\t<h3 class=\"upk-title\"><a href=\"https:\/\/soc.ticanalyse.org\/en\/2023\/08\/01\/cyberattaque-par-anonymous-sudan-de-nombreux-services-en-ligne-paralyses-au-kenya\/\" title=\"Cyber attack by Anonymous Sudan: Numerous online services paralysed in Kenya\" class=\"title-animation-underline\" aria-label=\"Cyber attack by Anonymous Sudan: Numerous online services paralysed in Kenya\">Cyber attack by Anonymous Sudan: Numerous online services paralysed in Kenya<\/a><\/h3>\t\t\t\t\t\t\t\t\t\t\t<div class=\"upk-meta upk-flex upk-flex-middle\">\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div data-separator=\"\/\/\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"upk-date\">\n\t\t\tAugust 1, 2023\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"upk-item upk-flex upk-flex-middle\">\n\t\t\t<div class=\"upk-img-wrap\">\n\t\t\t\t<img decoding=\"async\" class=\"upk-img\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png\" alt=\"Au S\u00e9n\u00e9gal, l\u2019\u00c9tat cibl\u00e9 par une cyberattaque\">\t\t\t<\/div>\n\t\t\t<div class=\"upk-content\">\n\t\t\t\t<div class=\"upk-count\"><\/div>\n\t\t\t\t<div class=\"upk-inner\">\n\t\t\t\t\t\t\t<div class=\"upk-category\">\n\t\t\t<a href=\"https:\/\/soc.ticanalyse.org\/en\/category\/actualite\/\" \n\t\t\t\t\t\t\taria-label=\"Category Actualit\u00e9\">News<\/a>\t\t<\/div>\n\t\t\t\t\t\t<h3 class=\"upk-title\"><a href=\"https:\/\/soc.ticanalyse.org\/en\/2023\/05\/27\/au-senegal-letat-cible-par-une-cyberattaque\/\" title=\"In Senegal, the state is targeted by a cyber attack\" class=\"title-animation-underline\" aria-label=\"In Senegal, the state is targeted by a cyber attack\">In Senegal, the state is targeted by a cyber attack<\/a><\/h3>\t\t\t\t\t\t\t\t\t\t\t<div class=\"upk-meta upk-flex upk-flex-middle\">\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div data-separator=\"\/\/\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"upk-date\">\n\t\t\tMay 27, 2023\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"upk-item upk-flex upk-flex-middle\">\n\t\t\t<div class=\"upk-img-wrap\">\n\t\t\t\t<img decoding=\"async\" class=\"upk-img\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png\" alt=\"Vent de panique \u00e0 l\u2019Union africaine apr\u00e8s une nouvelle cyberattaque\">\t\t\t<\/div>\n\t\t\t<div class=\"upk-content\">\n\t\t\t\t<div class=\"upk-count\"><\/div>\n\t\t\t\t<div class=\"upk-inner\">\n\t\t\t\t\t\t\t<div class=\"upk-category\">\n\t\t\t<a href=\"https:\/\/soc.ticanalyse.org\/en\/category\/actualite\/\" \n\t\t\t\t\t\t\taria-label=\"Category Actualit\u00e9\">News<\/a>\t\t<\/div>\n\t\t\t\t\t\t<h3 class=\"upk-title\"><a href=\"https:\/\/soc.ticanalyse.org\/en\/2023\/04\/25\/vent-de-panique-a-lunion-africaine-apres-une-nouvelle-cyberattaque\/\" title=\"Panic at the African Union after a new cyber attack\" class=\"title-animation-underline\" aria-label=\"Panic at the African Union after a new cyber attack\">Panic at the African Union after a new cyber attack<\/a><\/h3>\t\t\t\t\t\t\t\t\t\t\t<div class=\"upk-meta upk-flex upk-flex-middle\">\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div data-separator=\"\/\/\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"upk-date\">\n\t\t\tApril 25, 2023\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"upk-item upk-flex upk-flex-middle\">\n\t\t\t<div class=\"upk-img-wrap\">\n\t\t\t\t<img decoding=\"async\" class=\"upk-img\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png\" alt=\"Cybercriminalit\u00e9 : BOA Mali, derni\u00e8re cible d\u2019une menace qui se fait plus pressante dans l&rsquo;UEMOA\">\t\t\t<\/div>\n\t\t\t<div class=\"upk-content\">\n\t\t\t\t<div class=\"upk-count\"><\/div>\n\t\t\t\t<div class=\"upk-inner\">\n\t\t\t\t\t\t\t<div class=\"upk-category\">\n\t\t\t<a href=\"https:\/\/soc.ticanalyse.org\/en\/category\/actualite\/\" \n\t\t\t\t\t\t\taria-label=\"Category Actualit\u00e9\">News<\/a>\t\t<\/div>\n\t\t\t\t\t\t<h3 class=\"upk-title\"><a href=\"https:\/\/soc.ticanalyse.org\/en\/2023\/02\/14\/cybercriminalite-boa-mali-derniere-cible-dune-menace-qui-se-fait-plus-pressante-dans-luemoa\/\" title=\"Cybercriminalit\u00e9 : BOA Mali, derni\u00e8re cible d\u2019une menace qui se fait plus pressante dans l&rsquo;UEMOA\" class=\"title-animation-underline\" aria-label=\"Cybercriminalit\u00e9 : BOA Mali, derni\u00e8re cible d\u2019une menace qui se fait plus pressante dans l&rsquo;UEMOA\">Cybercrime: BOA Mali, the latest target of a growing threat in the WAEMU region<\/a><\/h3>\t\t\t\t\t\t\t\t\t\t\t<div class=\"upk-meta upk-flex upk-flex-middle\">\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div data-separator=\"\/\/\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"upk-date\">\n\t\t\tFebruary 14, 2023\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"upk-item upk-flex upk-flex-middle\">\n\t\t\t<div class=\"upk-img-wrap\">\n\t\t\t\t<img decoding=\"async\" class=\"upk-img\" src=\"https:\/\/soc.ticanalyse.org\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png\" alt=\"Burkina Faso: Une importante cyberattaque\">\t\t\t<\/div>\n\t\t\t<div class=\"upk-content\">\n\t\t\t\t<div class=\"upk-count\"><\/div>\n\t\t\t\t<div class=\"upk-inner\">\n\t\t\t\t\t\t\t<div class=\"upk-category\">\n\t\t\t<a href=\"https:\/\/soc.ticanalyse.org\/en\/category\/actualite\/\" \n\t\t\t\t\t\t\taria-label=\"Category Actualit\u00e9\">News<\/a>\t\t<\/div>\n\t\t\t\t\t\t<h3 class=\"upk-title\"><a href=\"https:\/\/soc.ticanalyse.org\/en\/2017\/08\/17\/burkina-faso-une-importante-cyberattaque\/\" title=\"Burkina Faso: A major cyber attack\" class=\"title-animation-underline\" aria-label=\"Burkina Faso: A major cyber attack\">Burkina Faso: A major cyber attack<\/a><\/h3>\t\t\t\t\t\t\t\t\t\t\t<div class=\"upk-meta upk-flex upk-flex-middle\">\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div data-separator=\"\/\/\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"upk-date\">\n\t\t\tAugust 17, 2017\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\n\t\t\t\t\t<div class=\"ep-pagination\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-32c74b5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"32c74b5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cbc8a99\" data-id=\"cbc8a99\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6690496 elementor-widget elementor-widget-heading\" data-id=\"6690496\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Frequently asked questions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-924bdfd elementor-widget elementor-widget-toggle\" data-id=\"924bdfd\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1531\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1531\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\"> What is a SOC?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1531\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1531\"><p>A Security Operations Center (SOC) is a security center that monitors and protects an organization's IT systems, networks and data. It is a command and control center for IT security.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1532\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1532\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What are the advantages of a SOC?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1532\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1532\"><p>A SOC offers a number of benefits, including real-time monitoring and detection of security threats, rapid response to security incidents, improved regulatory compliance and reduced security risks.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1533\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1533\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">How does a SOC work?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1533\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1533\"><p>A SOC works by continuously monitoring an organisation's IT systems, networks and data to detect security threats. Security analysts use monitoring and detection tools to identify security incidents and then take action to respond.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1534\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1534\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What types of threat can a SOC detect?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1534\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1534\"><p>A SOC can detect a wide variety of security threats, including phishing attacks, malware, denial of service (DDoS) attacks, brute force attacks and network intrusions.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1535\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1535\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">How can I contact the SOC in the event of a security incident?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1535\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1535\"><p>If you are a customer of our SOC, you can contact our 24\/7 support center to report a security incident. If you are not a customer, you can contact us via our website for assistance.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1536\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1536\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">How much does a SOC service cost?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1536\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1536\"><p>The cost of SOC services can vary depending on the size of the organisation, the level of protection required and the specific services requested. We offer bespoke security solutions to meet each customer's needs, and can provide detailed quotations on request.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-298508e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"298508e\" data-element_type=\"section\" id=\"tarification\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-fcba016\" data-id=\"fcba016\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cdeff20 elementor-widget elementor-widget-heading\" data-id=\"cdeff20\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pricing <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-31d0eaa\" data-id=\"31d0eaa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f15c3e6 elementor-widget elementor-widget-text-editor\" data-id=\"f15c3e6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We offer a range of pricing options for our SOC as a service to meet the needs of organisations of all sizes.<br \/><strong>Contact us to find out more about our offers.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-8589cf6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8589cf6\" data-element_type=\"section\" id=\"contact\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-45946e7\" data-id=\"45946e7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c04d67 elementor-widget elementor-widget-heading\" data-id=\"8c04d67\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">contact<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-512ad65 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"512ad65\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d3cd826\" data-id=\"d3cd826\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6fd8081 elementor-widget elementor-widget-text-editor\" data-id=\"6fd8081\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Si vous avez des questions ou si vous souhaitez en savoir plus sur notre service de SOC as a service, n&rsquo;h\u00e9sitez pas \u00e0 nous contacter \u00e0 l&rsquo;adresse suivante :<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48573e4 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"48573e4\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"tel:+226%2025%2035%2055%2035\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-phone\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">+226 25 35 55 35<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"tel:+226%2065%2034%2000%2000\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">| +226 65 34 00 00<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e68f24c elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"e68f24c\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"mailto:contact@ticanalyse.org\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-envelope\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">contact@ticanalyse.org<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-map-marker-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"> Somgand\u00e9, Sector 19, 1st floor of the building opposite the Clinique Notre Dame de la Paix (Clinique de Jean-Baptiste)  <br> 01 BP 726 Ouagadougou 01 <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a94b8d6 elementor-widget elementor-widget-text-editor\" data-id=\"a94b8d6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We'd be delighted to talk to you and answer any questions you may have.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-67e0639\" data-id=\"67e0639\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2dcc944b elementor-button-align-end elementor-mobile-button-align-center elementor-widget elementor-widget-form\" data-id=\"2dcc944b\" data-element_type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"New Form\" aria-label=\"New Form\" action=\"\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"35\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"2dcc944b\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"35\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-50\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tYour full name\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Your full name\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tYour email address\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Your email address\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-b26ecb6 elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-b26ecb6\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tPhone\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[b26ecb6]\" id=\"form-field-b26ecb6\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Phone\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-894019a elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-894019a\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tThe name of your organisation\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[894019a]\" id=\"form-field-894019a\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"The name of your organisation\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tMessage\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"4\" placeholder=\"Message\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Submit<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Security Operations Center (SOC) La Cyber S\u00e9curit\u00e9 n&rsquo;est pas une option ! Prot\u00e9gez votre organisation contre les menaces de s\u00e9curit\u00e9 avec notre SOC de pointe. Notre mission, vous fournir une s\u00e9curit\u00e9 informatique de qualit\u00e9. Une protection de bout en bout pour les organisations de toutes tailles. Pr\u00e9sentation Un Centre d&rsquo;op\u00e9rations de s\u00e9curit\u00e9 (SOC) g\u00e8re la [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-35","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/soc.ticanalyse.org\/en\/wp-json\/wp\/v2\/pages\/35","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/soc.ticanalyse.org\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/soc.ticanalyse.org\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/soc.ticanalyse.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/soc.ticanalyse.org\/en\/wp-json\/wp\/v2\/comments?post=35"}],"version-history":[{"count":0,"href":"https:\/\/soc.ticanalyse.org\/en\/wp-json\/wp\/v2\/pages\/35\/revisions"}],"wp:attachment":[{"href":"https:\/\/soc.ticanalyse.org\/en\/wp-json\/wp\/v2\/media?parent=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}