{"id":29,"date":"2020-08-03T14:28:04","date_gmt":"2020-08-03T14:28:04","guid":{"rendered":"https:\/\/africyse.com\/?page_id=29"},"modified":"2020-09-18T15:41:19","modified_gmt":"2020-09-18T15:41:19","slug":"technologies","status":"publish","type":"page","link":"https:\/\/africyse.com\/en\/technologies\/","title":{"rendered":"Technologies"},"content":{"rendered":"<section id=\"bt_bb_section69e2fea36e900\"  data-background_image_src=\"'https:\/\/africyse.com\/wp-content\/uploads\/2019\/04\/bgn-people.png'\" class=\"bt_bb_section bt_bb_top_spacing_extra_large bt_bb_bottom_spacing_large bt_bb_layout_boxed_1200 bt_bb_vertical_align_top btLazyLoadBackground bt_bb_background_image\" style=\"background-image:url(&#039;https:\/\/africyse.com\/wp-content\/plugins\/bold-page-builder\/img\/blank.gif&#039;);background-position:center;background-size:contain;\"><div class=\"bt_bb_port\"><div class=\"bt_bb_cell\"><div class=\"bt_bb_cell_inner\"><div class=\"bt_bb_row\"  data-bt-override-class=\"{}\"><div class=\"bt_bb_row_holder\" ><div  class=\"bt_bb_column col-md-6 col-sm-12 bt_bb_align_left bt_bb_vertical_align_top bt_bb_animation_fade_in zoom_out animate bt_bb_padding_normal\"  data-width=\"6\"><div class=\"bt_bb_column_content\"><header class=\"bt_bb_headline bt_bb_dash_none bt_bb_superheadline bt_bb_superheadline_outside bt_bb_subheadline bt_bb_size_large bt_bb_align_inherit\" data-bt-override-class=\"{}\"><div class=\"bt_bb_headline_superheadline_outside\"><span class=\"bt_bb_headline_superheadline\">TECHNOLOGIES<\/span><\/div><h2 class=\"bt_bb_headline_tag\"><span class=\"bt_bb_headline_content\"><span><b>Consultant en <\/b><br \/><br \/>\n<u>s\u00e9curit\u00e9 technologique<\/u><\/span><\/span><\/h2><div class=\"bt_bb_headline_subheadline\">Les plus grands enregistrements dans les structures de donn\u00e9es micro\u00e9lectroniques et les applications Web qui sont accessibles \u00e0 Internet, ils sont plus sans d\u00e9fense contre les violations. <\/div><\/header><div class=\"bt_bb_separator bt_bb_border_style_none bt_bb_bottom_spacing_medium\" data-bt-override-class=\"null\"><\/div><\/div><\/div><div  class=\"bt_bb_column col-md-6 col-sm-12 bt_bb_align_left bt_bb_vertical_align_top bt_bb_animation_fade_in zoom_out animate bt_bb_padding_normal\"  data-width=\"6\"><div class=\"bt_bb_column_content\"><\/div><\/div><\/div><\/div><div class=\"bt_bb_row  bt_bb_column_gap_45\" style=\"; --column-gap:45px;\" data-bt-override-class=\"{}\"><div class=\"bt_bb_row_holder\" ><div  class=\"bt_bb_column col-md-4 col-ms-12 bt_bb_align_left bt_bb_vertical_align_top bt_bb_animation_fade_in zoom_out animate bt_bb_padding_normal\"  data-width=\"4\"><div class=\"bt_bb_column_content\"><div  class=\"bt_bb_text\" ><\/p>\n<p><strong>Consultation Cybers\u00e9curit\u00e9:<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Les attaques de phishing et le spam sont l&rsquo;une des attaques les plus utilis\u00e9es contre les entreprises technologiques, sans une formation appropri\u00e9e sur la fa\u00e7on de g\u00e9rer ce type d&rsquo;attaques, peuvent conduire \u00e0 une violation de l&rsquo;ensemble de votre organisation et \u00e0 une fuite de donn\u00e9es confidentielles vers le dark web, la plupart des entreprises technologiques. ont \u00e9t\u00e9 viol\u00e9s s&rsquo;ils savent que ce n&rsquo;est pas le cas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">L&rsquo;\u00e9quipe d&rsquo;ing\u00e9nieurs-conseils techniques d&rsquo;Afri Cybersecurity peut assimiler des tests personnalis\u00e9s pour les menaces de s\u00e9curit\u00e9 dans votre cycle de vie de livraison constant.<\/span><\/p>\n<p>\n<\/div><div class=\"bt_bb_separator bt_bb_border_style_none bt_bb_top_spacing_small\" data-bt-override-class=\"null\"><\/div><\/div><\/div><div  class=\"bt_bb_column col-md-4 col-ms-12 bt_bb_align_left bt_bb_vertical_align_top bt_bb_animation_fade_in zoom_out animate bt_bb_padding_normal\"  data-width=\"4\"><div class=\"bt_bb_column_content\"><div  class=\"bt_bb_text\" ><\/p>\n<p><span style=\"font-weight: 400;\">Afri Cybersecurity Consulting accompagne le passage de votre entreprise vers un \u00e9tat s\u00e9curis\u00e9 avec la zone de service de s\u00e9curit\u00e9 suivante:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\"> Gestion du programme de cybers\u00e9curit\u00e9<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00c9laboration et mise en \u0153uvre de politiques de cybers\u00e9curit\u00e9<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Prestation de services de cybers\u00e9curit\u00e9<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Administration de l&rsquo;\u00e9quipe de cybers\u00e9curit\u00e9 et ISO<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Mise en place et gestion du contr\u00f4le de cybers\u00e9curit\u00e9<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Formation sur la cybers\u00e9curit\u00e9<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Gestion des risques li\u00e9s \u00e0 l\u2019information<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Op\u00e9rations de d\u00e9fense de cybers\u00e9curit\u00e9<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Test du logiciel de s\u00e9curit\u00e9 de l\u2019information<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Tests de p\u00e9n\u00e9tration<\/span><\/li>\n<\/ul>\n<p>\n<\/div><div class=\"bt_bb_separator bt_bb_border_style_none bt_bb_top_spacing_small\" data-bt-override-class=\"null\"><\/div><\/div><\/div><div  class=\"bt_bb_column col-md-4 col-ms-12 bt_bb_align_left bt_bb_vertical_align_top bt_bb_animation_fade_in zoom_out animate bt_bb_padding_normal\"  data-width=\"4\"><div class=\"bt_bb_column_content\"><div  class=\"bt_bb_text\" ><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\"> Programme de s\u00e9curit\u00e9 et accr\u00e9ditation<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"font-weight: 400;\"> Plan de d\u00e9tection et d&rsquo;intervention en cybers\u00e9curit\u00e9<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"font-weight: 400;\"> Cycle de vie du d\u00e9veloppement de la s\u00e9curit\u00e9<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"font-weight: 400;\"> \u00c9valuation de la cybers\u00e9curit\u00e9<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"font-weight: 400;\"> Test de vuln\u00e9rabilit\u00e9<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Afri Cybersecurity propose une gamme de services d&rsquo;\u00e9valuation de la s\u00e9curit\u00e9 et de test d&rsquo;intrusion pour identifier toutes les gammes de vuln\u00e9rabilit\u00e9 et vous aider \u00e0 att\u00e9nuer la menace d&rsquo;acc\u00e8s ill\u00e9gal. Afri Cybersecurity Engineer est compl\u00e9t\u00e9 par des sp\u00e9cialistes exp\u00e9riment\u00e9s des tests d&rsquo;intrusion qui poss\u00e8dent une richesse de connaissances dans diverses disciplines des technologies de l&rsquo;information ainsi que dans la politique, la conception, la mise en \u0153uvre et le d\u00e9veloppement.<\/span><\/p>\n<p>\n<\/div><div class=\"bt_bb_separator bt_bb_border_style_none bt_bb_bottom_spacing_normal\" data-bt-override-class=\"null\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-29","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/africyse.com\/en\/wp-json\/wp\/v2\/pages\/29","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/africyse.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/africyse.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/africyse.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/africyse.com\/en\/wp-json\/wp\/v2\/comments?post=29"}],"version-history":[{"count":3,"href":"https:\/\/africyse.com\/en\/wp-json\/wp\/v2\/pages\/29\/revisions"}],"predecessor-version":[{"id":3583,"href":"https:\/\/africyse.com\/en\/wp-json\/wp\/v2\/pages\/29\/revisions\/3583"}],"wp:attachment":[{"href":"https:\/\/africyse.com\/en\/wp-json\/wp\/v2\/media?parent=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}