Cyber.
Operational security, cyber defense, audit, and consulting.
In the face of increasingly sophisticated digital threats, we strengthen your teams to help protect your data and systems at every stage of your project or business lifecycle:
Connected objects, embedded systems, IoT, IIoT.
- Support throughout the entire lifecycle of your products.
- Risk analysis.
- Integration of security from the design phase.
- Compliance with the various standards of your sector (ISO 62443, UL 2900-1, UN-R155, ISO/SAE 21434, UNECE WP.29).
Governance.
- Implementation of governance.
- Risk analysis, compliance gaps.
- Information Security Management System.
- Support in implementing a security policy.
- Implementation of controls and indicators.
- Business continuity plan, disaster recovery plan, crisis management preparation.
- ISMS (Information System Master Plan).
- RGPD, NIS 2, DORA, CRA, IA ACT, DATA ACT, Data Governance Act, HDS, IGI 1300, IGI 2100, IGI 2102.
Operational security.
- Maintenance of security and operational readiness.
- Incident detection.
- Support in all stages of your security: Architecture, Build, RUN, SecOps, monitoring, supervision.
- Support in technologies: Antivirus, Firewall, SDWAN, SASE, EDR, NDR, XDR, UTM, Zero Trust architecture, IAM, PAM, VPN, Bastion, WAF, Certificates, PKI, Vault, SIEM, Active Directory.
- Threat modeling.
Consulting & Audit.
- Environment Audit.
- Network Audit.
- Web Vulnerability Audit.
- Configuration Audit.
- Compliance Audit.
- Microsoft 365 Audit.
They trust us.