{"id":870,"date":"2019-10-27T14:50:00","date_gmt":"2019-10-27T18:50:00","guid":{"rendered":"https:\/\/orendasecurity.com\/?page_id=870"},"modified":"2019-12-04T20:00:41","modified_gmt":"2019-12-05T01:00:41","slug":"tests-intrusion","status":"publish","type":"page","link":"https:\/\/orendasecurity.com\/fr\/services\/tests-intrusion\/","title":{"rendered":"Services de tests d\u2019intrusion"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-870\" data-postid=\"870\" class=\"themify_builder_content themify_builder_content-870 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_knm3724 tb_first tf_w\">\n            <span  class=\"builder_row_cover tf_abs\" data-lazy=\"1\"><\/span><span class=\"tb_row_frame_wrap tf_overflow tf_abs\" data-lazy=\"1\"><span class=\"tb_row_frame tb_row_frame_bottom  tf_abs tf_hide tf_overflow tf_w\"><\/span><\/span>            <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_ffap726 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_1 tb_kbhw727\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col-full tb_rjtf728 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_p6o3729   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h1>Services de tests d\u2019intrusion<\/h1>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_1 tb_czxa731\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col-full tb_neho731 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_tspa732   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Les services d\u2019\u00e9valuation d\u2019Orenda Security simulent des tentatives r\u00e9elles d\u2019intrusion dans vos r\u00e9seaux, applications et environnements infonuagiques.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_3 tb_2fmn243\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col3-1 tb_48mw244 first\">\n                    <!-- module buttons -->\n<div  class=\"module module-buttons tb_3jfq244 buttons-horizontal solid  squared\" data-lazy=\"1\">\n        <div class=\"module-buttons-item tf_in_flx\">\n                        <a href=\"\/fr\/demander-un-devis\" class=\"ui builder_button tf_in_flx tb_default_color\" target=\"_blank\" rel=\"noopener\">\n                                                DEMANDER UN DEVIS                                        <\/a>\n                <\/div>\n            <\/div>\n<!-- \/module buttons -->\n        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col3-1 tb_ptbg245\">\n                    <!-- module buttons -->\n<div  class=\"module module-buttons tb_7efw245 buttons-horizontal solid  squared\" data-lazy=\"1\">\n        <div class=\"module-buttons-item tf_in_flx\">\n                        <a href=\"#services\" class=\"ui builder_button tf_in_flx tb_default_color\" >\n                                                EN SAVOIR PLUS                                        <\/a>\n                <\/div>\n            <\/div>\n<!-- \/module buttons -->\n        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col3-1 tb_k0gc245 last\">\n                            <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_1 tb_y22z735\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col-full tb_8qkj735 first\">\n                    <!-- module icon -->\n<div  class=\"module module-icon tb_ol9o736  normal none icon_horizontal tf_textc hover-wow wow\" data-tf-animation_hover=\"flash\" data-tf-animation=\"flash\" data-lazy=\"1\">\n\t\t\t<div class=\"module-icon-item\">\n\t\t\t\t\t\t\t<a href=\"#services\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<em class=\"tf_boxtb_default_color\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t><svg  class=\"tf_fa tf-ti-angle-double-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-angle-double-down\" xlink:href=\"#tf-ti-angle-double-down\"><\/use><\/svg><\/em>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<!-- \/module icon -->\n        <\/div>\n                    <\/div>\n                <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-anchor=\"services\" data-lazy=\"1\" class=\"module_row themify_builder_row tb_has_section tb_section-services tb_pvac724 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_wd34737 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_xq6e737  repeat \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Orenda Security offre des tests d\u2019intrusion de grande qualit\u00e9 qui simulent les activit\u00e9s de r\u00e9els cyberpr\u00e9dateurs pour trouver des vuln\u00e9rabilit\u00e9s dans les syst\u00e8mes cibl\u00e9s et les exploiter dans des circonstances contr\u00f4l\u00e9es. Nous utilisons notre expertise technique pour d\u00e9terminer et documenter les risques et les impacts d\u2019affaires potentiels, de fa\u00e7on professionnelle et s\u00e9curitaire, en accord avec la port\u00e9e et les r\u00e8gles du mandat soigneusement \u00e9tablies, et avec pour objectif d\u2019aider les organisations \u00e0 prioriser leurs ressources dans l\u2019am\u00e9lioration de leur posture de s\u00e9curit\u00e9. Nous personnalisons notre offre de tests d\u2019intrusion pour nous assurer de rencontrer vos exigences de conformit\u00e9, telles que les exigences de tests d\u2019intrusion PCI DSS.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row accounting-services accounting-services-border tb_e4j4724 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_ptfd738 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_middle tb_col_count_2 tb_ylti738\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-1 tb_k3j2739 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_twz5739 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/VULNERABILITY.png\" width=\"207\" height=\"207\" title=\"Services de tests d\u2019intrusion\" alt=\"Services de tests d\u2019intrusion\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-3 tb_zmx9739 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_wzsc740   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>Processus de tests d\u2019intrusion<\/h2><p>Les tests d\u2019intrusion et l\u2019\u00e9valuation des vuln\u00e9rabilit\u00e9s du syst\u00e8me et du r\u00e9seau d\u2019infrastructure sont essentiels pour d\u00e9celer les vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 qui sont utilis\u00e9es pour lancer une cyberattaque via l\u2019internet. Les tests de r\u00e9seau interne ou l\u2019\u00e9valuation de s\u00e9curit\u00e9 des syst\u00e8mes faisant face \u00e0 l\u2019internet aident \u00e0 d\u00e9couvrir les services de r\u00e9seau vuln\u00e9rables qui peuvent \u00eatre exploit\u00e9s par des sources inconnues de menaces.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w gutter-narrow col_align_top tb_col_count_2 tb_3mo3740\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_tft3741 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_2odu741 image-center   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/profiling-and-discovery.png\" width=\"120\" height=\"220\" title=\"Services de tests d\u2019intrusion\" alt=\"Services de tests d\u2019intrusion\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image --><!-- module text -->\n<div  class=\"module module-text tb_0whe742   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Phase 1<\/p><h3>Profilage et d\u00e9couverte<\/h3><p>Cette \u00e9tape implique l\u2019utilisation de plusieurs outils de balayage pour identifier les serveurs et services actifs, incluant la cartographie du r\u00e9seau, le banner grabbing, l\u2019identification du syst\u00e8me d\u2019exploitation (OS fingerprinting), l\u2019identification des services, la d\u00e9couverte des protocoles et les versions support\u00e9es.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_e8fy742 last\">\n                    <!-- module divider -->\n<div  class=\"module tf_mw module-divider tb_bx7g742 solid    hide-desktop hide-tablet\" style=\"border-width: 1px;border-color: #000000;margin-top: 20px;margin-bottom: 20px;\" data-lazy=\"1\">\n    <\/div>\n<!-- \/module divider -->\n<!-- module image -->\n<div  class=\"module module-image tb_k1u8742 image-center   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/security-scanning.png\" width=\"120\" height=\"220\" title=\"Services de tests d\u2019intrusion\" alt=\"Services de tests d\u2019intrusion\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image --><!-- module text -->\n<div  class=\"module module-text tb_e67w742   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Phase 2<\/p><h3>\u00c9valuation de la s\u00e9curit\u00e9 de l\u2019infrastructure<\/h3><p>L\u2019\u00e9tape d\u2019\u00e9valuation implique le balayage automatis\u00e9 des vuln\u00e9rabilit\u00e9s dans les services r\u00e9seau, les syst\u00e8mes d\u2019information et les contr\u00f4les de s\u00e9curit\u00e9 du p\u00e9rim\u00e8tre par des outils d\u2019entreprise les plus \u00e0 jour. De plus, des analyses manuelles permettent de v\u00e9rifier les r\u00e9sultats du balayage automatis\u00e9 afin d\u2019\u00e9liminer les faux-positifs.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n        <!-- module divider -->\n<div  class=\"module tf_mw module-divider tb_6y4j743 solid   \" style=\"border-width: 1px;border-color: #000000;margin-top: 20px;margin-bottom: 20px;\" data-lazy=\"1\">\n    <\/div>\n<!-- \/module divider -->\n        <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w gutter-narrow col_align_top tb_col_count_2 tb_utgr743\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_4jyd743 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_3b80743 image-center   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/application-vulnerability-determination.png\" width=\"120\" height=\"220\" title=\"Services de tests d\u2019intrusion\" alt=\"Services de tests d\u2019intrusion\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image --><!-- module text -->\n<div  class=\"module module-text tb_3wqz745   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Phase 3<\/p><h3>Exploitation des vuln\u00e9rabilit\u00e9s de l\u2019infrastructure<\/h3><p>Cette \u00e9tape utilise l\u2019information recueillie sur les services et ports actifs et les vuln\u00e9rabilit\u00e9s qui y sont reli\u00e9es pour exploiter, en toute s\u00e9curit\u00e9, les services \u00e0 risque. Les sc\u00e9narios d\u2019attaque des environnements de production utiliseront une combinaison de charge d\u2019exploits en accord avec les r\u00e8gles \u00e9tablies du mandat.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_skbh745 last\">\n                    <!-- module divider -->\n<div  class=\"module tf_mw module-divider tb_vjxg745 solid    hide-desktop hide-tablet\" style=\"border-width: 1px;border-color: #000000;margin-top: 20px;margin-bottom: 20px;\" data-lazy=\"1\">\n    <\/div>\n<!-- \/module divider -->\n<!-- module image -->\n<div  class=\"module module-image tb_n8pe745 image-center   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/application-vulnerability-exploitation.png\" width=\"120\" height=\"220\" title=\"Services de tests d\u2019intrusion\" alt=\"Services de tests d\u2019intrusion\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image --><!-- module text -->\n<div  class=\"module module-text tb_xh74745   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Phase 4<\/p><h3>Rapports<\/h3><p>Toutes les vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 exploitables du syst\u00e8me cibl\u00e9 sont enregistr\u00e9es avec leurs valeurs CVSS v2 associ\u00e9es. Les vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 identifi\u00e9es sont \u00e9valu\u00e9es minutieusement et consign\u00e9es dans un rapport avec les mesures de mitigation ou les recommandations appropri\u00e9es.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n        <!-- module divider -->\n<div  class=\"module tf_mw module-divider tb_2ob5746 solid   \" style=\"border-width: 1px;border-color: #000000;margin-top: 20px;margin-bottom: 20px;\" data-lazy=\"1\">\n    <\/div>\n<!-- \/module divider -->\n        <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w gutter-narrow col_align_top tb_col_count_2 tb_8uij746\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_w84e746 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_ceyk746 image-center   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/reporting-vulnerability.png\" width=\"120\" height=\"220\" title=\"Services de tests d\u2019intrusion\" alt=\"Services de tests d\u2019intrusion\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image --><!-- module text -->\n<div  class=\"module module-text tb_h1hy746   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Phase 5<\/p><h3>Rem\u00e9diation et r\u00e9\u00e9valuation<\/h3><p>La rem\u00e9diation implique de l\u2019assistance pour rem\u00e9dier aux vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 de l\u2019infrastructure qui ont \u00e9t\u00e9 identifi\u00e9es. Apr\u00e8s la rem\u00e9diation, une r\u00e9\u00e9valuation sera r\u00e9alis\u00e9e afin de valider l\u2019efficacit\u00e9 des contremesures de contr\u00f4le des TI utilis\u00e9es pour mitiger les vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 mentionn\u00e9es dans le rapport.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_mpuy747 last\">\n                            <\/div>\n                    <\/div>\n                <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row accounting-services accounting-services-border tb_lszs724 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_czhh747 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_middle tb_col_count_2 tb_6v71747\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-1 tb_u9kc748 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_9vaa748 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/network.png\" width=\"208\" height=\"208\" title=\"Services de tests d\u2019intrusion\" alt=\"Services de tests d\u2019intrusion\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-3 tb_1nta748 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_ys5o748   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>R\u00e9seau et <br \/>infrastructure<\/h2><p>Pendant un test d\u2019intrusion de r\u00e9seau, nous tentons de percer le p\u00e9rim\u00e8tre de votre r\u00e9seau en exposant des faiblesses des serveurs et des appareils r\u00e9seau. Nous utilisons notre acc\u00e8s initial \u00e0 votre r\u00e9seau pour sonder le c\u0153ur du r\u00e9seau et les appareils associ\u00e9s. Nous proc\u00e9dons ensuite \u00e0 une \u00e9tude \u00e0 l\u2019int\u00e9rieur du p\u00e9rim\u00e8tre pour identifier des m\u00e9thodes additionnelles pouvant compromettre les d\u00e9fenses de votre r\u00e9seau.<br \/>L\u2019\u00e9valuation de la s\u00e9curit\u00e9 de votre r\u00e9seau externe comprend plusieurs \u00e9tapes.<\/p><p>Les principales \u00e9tapes incluent:<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_1 tb_3s0y749\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col-full tb_qs1k749 first\">\n                    <!-- module accordion -->\n<div  class=\"module module-accordion tb_v63c749 \" data-behavior=\"toggle\" data-lazy=\"1\">\n    \n    <ul class=\"ui module-accordion  shadow tb_default_color\">\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-v63c749-0\" class=\"tb_title_accordion\" aria-controls=\"acc-v63c749-0-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Collecte anonyme de renseignements<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-v63c749-0-content\" data-id=\"acc-v63c749-0\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Collecte anonyme de renseignements pour d\u00e9couvrir tous les actifs faisant face \u00e0 l\u2019internet qu\u2019un pirate informatique pourrait identifier comme point d\u2019acc\u00e8s potentiel \u00e0 votre r\u00e9seau.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-v63c749-1\" class=\"tb_title_accordion\" aria-controls=\"acc-v63c749-1-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Balayage des r\u00e9seaux<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-v63c749-1-content\" data-id=\"acc-v63c749-1\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Balayage des serveurs web et des points d\u2019acc\u00e8s de votre r\u00e9seau accessibles via l\u2019internet pour d\u00e9celer des vuln\u00e9rabilit\u00e9s connues (sans authentifiant).<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-v63c749-2\" class=\"tb_title_accordion\" aria-controls=\"acc-v63c749-2-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">V\u00e9rification des r\u00e9sultats<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-v63c749-2-content\" data-id=\"acc-v63c749-2\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>V\u00e9rification des r\u00e9sultats du balayage par des techniques manuelles approfondies d\u2019attaques par tests d\u2019intrusion (avec et sans authentifiant).<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-v63c749-3\" class=\"tb_title_accordion\" aria-controls=\"acc-v63c749-3-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Conseils<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-v63c749-3-content\" data-id=\"acc-v63c749-3\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Conseils avis\u00e9s de rem\u00e9diation et services consultatifs \u00e0 propos des vuln\u00e9rabilit\u00e9s identifi\u00e9es\/v\u00e9rifi\u00e9es.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n        <\/ul>\n\n<\/div><!-- \/module accordion -->        <\/div>\n                    <\/div>\n                <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row accounting-services accounting-services-border tb_tadf724 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_0ic7750 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_middle tb_col_count_2 tb_tcaz750\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-1 tb_njbk750 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_qx9o750 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/network.png\" width=\"208\" height=\"208\" title=\"Services de tests d\u2019intrusion\" alt=\"Services de tests d\u2019intrusion\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-3 tb_8kv9751 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_uszh751   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>Tests d\u2019intrusion interne<\/h2><p>Mettre l\u2019emphase sur l\u2019exploitation de l\u2019infrastructure et des services priv\u00e9s ou accessibles de l\u2019interne qui peuvent poser un haut risque pour les applications et les syst\u00e8mes essentiels \u00e0 votre entreprise. L\u2019\u00e9valuation de la s\u00e9curit\u00e9 de votre r\u00e9seau externe comprend plusieurs \u00e9tapes. Les principales \u00e9tapes incluent:<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_1 tb_7lwk751\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col-full tb_n9vp751 first\">\n                    <!-- module accordion -->\n<div  class=\"module module-accordion tb_svhe751 \" data-behavior=\"toggle\" data-lazy=\"1\">\n    \n    <ul class=\"ui module-accordion  shadow tb_default_color\">\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-svhe751-0\" class=\"tb_title_accordion\" aria-controls=\"acc-svhe751-0-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Pare-feux de r\u00e9seau<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-svhe751-0-content\" data-id=\"acc-svhe751-0\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Les appareils de r\u00e9seaux centraux et p\u00e9riph\u00e9riques sont toujours les principales cibles des pirates informatiques car ces appareils \u00e9tablissent une connectivit\u00e9 critique entre les r\u00e9seaux corporatifs. Les tests de renforcement de ces appareils sont essentiels pour s\u2019assurer que les vuln\u00e9rabilit\u00e9s exploitables soient identifi\u00e9es.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-svhe751-1\" class=\"tb_title_accordion\" aria-controls=\"acc-svhe751-1-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Serveurs<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-svhe751-1-content\" data-id=\"acc-svhe751-1\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Les serveurs h\u00e9bergent les donn\u00e9es essentielles de toute entreprise et repr\u00e9sentent la cible ultime. Qu\u2019il s\u2019agisse de serveurs d\u2019application, de base de donn\u00e9es ou de stockage de fichiers, ils doivent \u00eatre renforc\u00e9s. Les serveurs de base de donn\u00e9es sont des cibles de choix car ils renferment habituellement des donn\u00e9es financi\u00e8res, des donn\u00e9es sur les d\u00e9tenteurs de cartes ou des renseignements permettant d\u2019identifier des personnes (PII).<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-svhe751-2\" class=\"tb_title_accordion\" aria-controls=\"acc-svhe751-2-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Stations de travail<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-svhe751-2-content\" data-id=\"acc-svhe751-2\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Les stations de travail et les ordinateurs portatifs des utilisateurs ayant des acc\u00e8s privil\u00e9gi\u00e9s sont souvent des cibles, consid\u00e9rant leurs acc\u00e8s aux syst\u00e8mes essentiels. Le ciblage s\u00e9lectif de ces syst\u00e8mes pour utilisateurs, dans le but de d\u00e9celer des vuln\u00e9rabilit\u00e9s exploitables, peut permettre d\u2019identifier des menaces \u00e0 haut risque.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-svhe751-3\" class=\"tb_title_accordion\" aria-controls=\"acc-svhe751-3-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Appareils mobiles<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-svhe751-3-content\" data-id=\"acc-svhe751-3\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Les menaces des appareils mobiles continuent de croitre alors que la capacit\u00e9 des appareils mobiles \u00e0 acc\u00e9der aux ressources corporatives internes et aux applications d\u2019affaires essentielles est maintenant la norme.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-svhe751-4\" class=\"tb_title_accordion\" aria-controls=\"acc-svhe751-4-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Routeurs, commutateurs et autre mat\u00e9riel r\u00e9seau<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-svhe751-4-content\" data-id=\"acc-svhe751-4\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Les serveurs h\u00e9bergent les donn\u00e9es essentielles de toute entreprise et repr\u00e9sentent la cible ultime. Qu\u2019il s\u2019agisse de serveurs d\u2019application, de base de donn\u00e9es ou de stockage de fichiers, ils doivent \u00eatre renforc\u00e9s. Les serveurs de base de donn\u00e9es sont des cibles de choix car ils renferment habituellement des donn\u00e9es financi\u00e8res, des donn\u00e9es sur les d\u00e9tenteurs de cartes ou des renseignements permettant d\u2019identifier des personnes (PII).<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-svhe751-5\" class=\"tb_title_accordion\" aria-controls=\"acc-svhe751-5-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Appareils (IoT)<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-svhe751-5-content\" data-id=\"acc-svhe751-5\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Les appareils sont de plus en plus adopt\u00e9s par les entreprises qui prennent avantage de l\u2019internet des objets (IoT) et des donn\u00e9es massives (big data) pour am\u00e9liorer leurs processus. Ces appareils deviennent ainsi des cibles et doivent \u00eatre prot\u00e9g\u00e9s de fa\u00e7on semblable aux autres syst\u00e8mes essentiels de votre environnement.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n        <\/ul>\n\n<\/div><!-- \/module accordion -->        <\/div>\n                    <\/div>\n                <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row accounting-services accounting-services-border tb_j5qi724 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_8lc0752 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_middle tb_col_count_2 tb_80s8752\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-1 tb_5j65752 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_qa7a752 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/network.png\" width=\"208\" height=\"208\" title=\"Services de tests d\u2019intrusion\" alt=\"Services de tests d\u2019intrusion\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-3 tb_l14m753 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_ztb4753   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>Tests d\u2019intrusion externe<\/h2><p>Nous mettons l\u2019emphase sur l\u2019exploitation de l\u2019infrastructure et des services accessibles de l\u2019internet d\u00e9crits ci-dessous. Il faut rester vigilants avec les services et syst\u00e8mes externes car ils sont les cibles constantes des pirates informatiques en tant que points d\u2019acc\u00e8s des syst\u00e8mes qui h\u00e9bergent des renseignements sensibles. En \u00e9tudiant l\u2019architecture de votre r\u00e9seau externe et les services qui sont accessibles de l\u2019internet, nous pouvons mieux identifier les menaces et les risques sp\u00e9cifiques \u00e0 votre environnement d\u2019affaires. Les cibles externes courantes incluent :<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_middle tb_col_count_1 tb_1h1f753\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col-full tb_23qu753 first\">\n                    <!-- module accordion -->\n<div  class=\"module module-accordion tb_hx4j753 \" data-behavior=\"toggle\" data-lazy=\"1\">\n    \n    <ul class=\"ui module-accordion  shadow tb_default_color\">\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-hx4j753-0\" class=\"tb_title_accordion\" aria-controls=\"acc-hx4j753-0-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Coupe-feux de r\u00e9seaux\/applications<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-hx4j753-0-content\" data-id=\"acc-hx4j753-0\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Contourner des coupe-feux de r\u00e9seaux\/applications accessibles de l\u2019externe est une strat\u00e9gie cl\u00e9 pour avoir acc\u00e8s \u00e0 des cibles de grande valeur. Les coupe-feux de r\u00e9seaux\/applications sont les gardiens des r\u00e9seaux corporatifs et, en tant que tel, ils devraient \u00eatre configur\u00e9s ad\u00e9quatement et test\u00e9s r\u00e9guli\u00e8rement.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-hx4j753-1\" class=\"tb_title_accordion\" aria-controls=\"acc-hx4j753-1-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Serveurs web<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-hx4j753-1-content\" data-id=\"acc-hx4j753-1\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Ces serveurs offrent habituellement du contenu d\u2019affaires important au public et aux clients et, en ce sens, ils sont des cibles de choix pour les pirates informatiques. Compromettre un serveur web peut mener \u00e0 l\u2019exploitation des serveurs de bases de donn\u00e9es ou \u00e0 d\u2019autres serveurs h\u00e9bergeant des donn\u00e9es sensibles.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-hx4j753-2\" class=\"tb_title_accordion\" aria-controls=\"acc-hx4j753-2-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">DNS<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-hx4j753-2-content\" data-id=\"acc-hx4j753-2\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Le syst\u00e8me de nom de domaine (DNS) est au c\u0153ur du r\u00e9seau TI de chaque entreprise. Il traduit les noms de domaine, ou adresses de sites web, en adresses num\u00e9riques IP (Internet Protocol) reconnaissables par des ordinateurs. Il est en quelque sorte le carnet d\u2019adresses de l\u2019Internet et, en tant que tel, il occupe une fonction essentielle de l\u2019infrastructure TI de toutes les organisations, sans laquelle elles ne pourraient pas fonctionner. Tester la s\u00e9curit\u00e9 du DNS est plus essentiel que jamais.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-hx4j753-3\" class=\"tb_title_accordion\" aria-controls=\"acc-hx4j753-3-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Serveurs de courriel<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-hx4j753-3-content\" data-id=\"acc-hx4j753-3\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Des serveurs de courriel compromis peuvent causer des ravages \u00e0 toute entreprise, puisque les courriels facilitent une fonction d\u2019affaires pour les corporations, les clients et les partenaires. Les serveurs de courriel contiennent et transmettent souvent des renseignements sensibles de l\u2019entreprise qui peuvent pr\u00e9senter des risques de confidentialit\u00e9, de r\u00e9glementation et de r\u00e9putation s\u2019ils sont expos\u00e9s.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-hx4j753-4\" class=\"tb_title_accordion\" aria-controls=\"acc-hx4j753-4-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">DMZ et serveurs face au public<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-hx4j753-4-content\" data-id=\"acc-hx4j753-4\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Les serveurs h\u00e9berg\u00e9s dans la zone d\u00e9militaris\u00e9e (DMZ) sont des cibles toujours populaires car ils sont accessibles de l\u2019internet et sont susceptibles d\u2019avoir une connectivit\u00e9 avec les serveurs d\u2019applications et de bases de donn\u00e9es. Souvent utilis\u00e9s comme syst\u00e8mes transactionnels facilitant les paiements ou traitant d\u2019autres donn\u00e9es sensibles, il est essentiel de renforcer et de tester ces serveurs au moins sur une base annuelle, particuli\u00e8rement ceux qui sont utilis\u00e9s pour du traitement PCI DSS ou pour emmagasiner des donn\u00e9es sur les d\u00e9tenteurs de cartes.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-hx4j753-5\" class=\"tb_title_accordion\" aria-controls=\"acc-hx4j753-5-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">VPN et points d\u2019acc\u00e8s<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-hx4j753-5-content\" data-id=\"acc-hx4j753-5\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Les r\u00e9seaux priv\u00e9s virtuels (VPN) facilitent souvent l\u2019acc\u00e8s \u00e0 distance aux ressources des r\u00e9seaux internes pour les employ\u00e9s, partenaires ou fournisseurs. Une configuration inad\u00e9quate des acc\u00e8s peut mener \u00e0 des acc\u00e8s non autoris\u00e9s et compromettre les syst\u00e8mes internes. L\u2019acc\u00e8s peut ensuite \u00eatre exploit\u00e9 au profit de logiciels malveillants ou d\u2019autres attaques.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-hx4j753-6\" class=\"tb_title_accordion\" aria-controls=\"acc-hx4j753-6-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Routeurs, commutateurs et autre mat\u00e9riel r\u00e9seau<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-hx4j753-6-content\" data-id=\"acc-hx4j753-6\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Les appareils r\u00e9seau qui font face \u00e0 l\u2019internet sont des cibles de choix pour les pirates informatiques car ces appareils \u00e9tablissent une connectivit\u00e9 cruciale entre les r\u00e9seaux priv\u00e9s et publics. Ils repr\u00e9sentent \u00e9galement des cibles pour les attaques par d\u00e9ni de service. Il est essentiel de tester le renforcement de ces appareils pour identifier les configurations inad\u00e9quates et s\u2019assurer que les vuln\u00e9rabilit\u00e9s exploitables soient identifi\u00e9es.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n        <\/ul>\n\n<\/div><!-- \/module accordion -->        <\/div>\n                    <\/div>\n                <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row accounting-services accounting-services-border tb_ez9v724 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_jrtp754 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_middle tb_col_count_2 tb_yy25754\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-1 tb_hei3754 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_k9jj754 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/network.png\" width=\"208\" height=\"208\" title=\"Services de tests d\u2019intrusion\" alt=\"Services de tests d\u2019intrusion\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-3 tb_rypw755 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_38o9755   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>Tester l\u2019internet des objets (IoT)<\/h2><p>L\u2019infrastructure et les appareils IoT sont d\u00e9ploy\u00e9s partout, des r\u00e9sidences aux infrastructures critiques. Les tests d\u2019intrusion de Orenda Security abordent ces tests en \u00e9tudiant les interactions entre les diff\u00e9rentes composantes et en s\u00e9curisant chacune.<\/p><p>Selon la port\u00e9e et les cibles sp\u00e9cifiques, les t\u00e2ches et les composantes suivantes pourraient \u00eatre \u00e9valu\u00e9es:<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_middle tb_col_count_1 tb_wrte756\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col-full tb_2f2q756 first\">\n                    <!-- module accordion -->\n<div  class=\"module module-accordion tb_lotx756 \" data-behavior=\"toggle\" data-lazy=\"1\">\n    \n    <ul class=\"ui module-accordion  shadow tb_default_color\">\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-lotx756-0\" class=\"tb_title_accordion\" aria-controls=\"acc-lotx756-0-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Mod\u00e9lisation de menaces<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-lotx756-0-content\" data-id=\"acc-lotx756-0\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>L\u2019utilisation d\u2019un processus de mod\u00e9lisation des menaces est une \u00e9tape cl\u00e9 dans l\u2019identification des menaces des composantes de l\u2019\u00e9cosyst\u00e8me IoT. Cela inclut l\u2019inventaire et la cartographie des appareils, applications et services essentiels, ainsi que l\u2019analyse des d\u00e9pendances associ\u00e9es.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-lotx756-1\" class=\"tb_title_accordion\" aria-controls=\"acc-lotx756-1-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Mat\u00e9riel informatique<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-lotx756-1-content\" data-id=\"acc-lotx756-1\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Les \u00e9quipements informatiques et les micrologiciels (firmware) ne repr\u00e9sentent qu\u2019une partie de l\u2019\u00e9cosyst\u00e8me IoT. Les appareils et micrologiciels associ\u00e9s doivent \u00eatre fiables et s\u00e9curis\u00e9s. Les vuln\u00e9rabilit\u00e9s qui y sont exploit\u00e9es peuvent poser des menaces importantes \u00e0 d\u2019autres services connect\u00e9s.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-lotx756-2\" class=\"tb_title_accordion\" aria-controls=\"acc-lotx756-2-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Revue du code source<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-lotx756-2-content\" data-id=\"acc-lotx756-2\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Le code devrait \u00eatre test\u00e9 pendant le cycle de d\u00e9veloppement des logiciels (SDLC), les vuln\u00e9rabilit\u00e9s identifi\u00e9es t\u00f4t durant le processus de d\u00e9veloppement et rem\u00e9di\u00e9es avant le d\u00e9ploiement en production.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-lotx756-3\" class=\"tb_title_accordion\" aria-controls=\"acc-lotx756-3-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Applications mobiles, web et API<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-lotx756-3-content\" data-id=\"acc-lotx756-3\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>L\u2019\u00e9valuation de l\u2019int\u00e9gration s\u00e9curis\u00e9e des applications mobiles, services web et API est une \u00e9tape fondamentale dans la protection de l\u2019\u00e9cosyst\u00e8me IoT. Les tests de s\u00e9curit\u00e9 d\u00e9voileront des faiblesses et des vuln\u00e9rabilit\u00e9s dans leur int\u00e9gration.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-lotx756-4\" class=\"tb_title_accordion\" aria-controls=\"acc-lotx756-4-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Applications infonuagiques<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-lotx756-4-content\" data-id=\"acc-lotx756-4\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>L\u2019int\u00e9gration des applications infonuagiques est en constante progression et ce n\u2019est pas diff\u00e9rent dans les environnements IoT. Nous \u00e9valuons la s\u00e9curit\u00e9 de telles int\u00e9grations et testons les contr\u00f4les de s\u00e9curit\u00e9 en place.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n        <\/ul>\n\n<\/div><!-- \/module accordion -->        <\/div>\n                    <\/div>\n                <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-anchor=\"services\" data-lazy=\"1\" class=\"module_row themify_builder_row tb_has_section tb_section-services tb_1vp5725 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_2uld757 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_qpas757  repeat \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>D\u00e9couvrez nos services en:<\/h2>    <\/div>\n<\/div>\n<!-- \/module text -->        <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w gutter-none col_align_top tb_col_count_2 tb_msro757\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_gw4t758 first\">\n                    <!-- module feature -->\n<div  class=\"module module-feature tb_02rf758 with-chart layout-icon-left size-small \" data-layout-mobile=\"icon-top\" data-layout-desktop=\"icon-left\" data-lazy=\"1\">\n        <div class=\"module-feature-image tf_textc tf_rel\">\n                            <a href=\"\/fr\/services\/evaluation-risques-cybersecurite\/\" aria-label=\"\u00c9VALUATION DE RISQUES DE CYBERS\u00c9CURIT\u00c9\">\n                        <span class=\"module-feature-chart-html5 tf_box tf_rel tf_inline_b\">\n                                    <svg class=\"tf_abs tf_w tf_h\">\n                    <circle class=\"tb_feature_fill\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke-width=\"2\"\/>\n                    <circle class=\"tb_feature_stroke\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke=\"#20232e\" stroke-width=\"2\" data-progress=\"100\" stroke-dasharray=\"0,10000\"\/>\n                                        <\/svg>\n                                <span class=\"chart-html5-circle tf_w tf_h\">\n                    <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/PENTEST.png\" width=\"100\" height=\"100\" style=\"width:calc(100% - 4px);height:calc(100% - 4px)\" alt=\"\u00c9VALUATION DE RISQUES DE CYBERS\u00c9CURIT\u00c9\">                                    <\/span>\n\n                \n            <\/span>\n                        <\/a>\n            <\/div>\n    <div class=\"module-feature-content tf_textc\">\n                    <h3 class=\"module-feature-title\">\n                            <a href=\"\/fr\/services\/evaluation-risques-cybersecurite\/\" aria-label=\"\u00c9VALUATION DE RISQUES DE CYBERS\u00c9CURIT\u00c9\">\u00c9VALUATION DE RISQUES DE CYBERS\u00c9CURIT\u00c9<\/a>\n                        <\/h3>\n                    <div class=\"tb_text_wrap\">\n            <p>Quels sont les actifs les plus pr\u00e9cieux de votre entreprise? Et si vos donn\u00e9es \u00e9taient d\u00e9j\u00e0 \u00e0 haut risque et que vous les perdiez? Quel serait l\u2019impact sur vos affaires, vos clients, vos revenus? Votre organisation peut-elle se permettre d\u2019\u00eatre en panne, ne serait-ce qu\u2019une seule journ\u00e9e, \u00e0 cause d\u2019un incident de cybers\u00e9curit\u00e9? Encore plus inqui\u00e9tant: et si vos donn\u00e9es essentielles \u00e9taient d\u00e9j\u00e0 compromises sans que vous le sachiez.<\/p>        <\/div>\n    <\/div>\n<\/div>\n<!-- \/module feature -->\n        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_th0i758 last\">\n                    <!-- module feature -->\n<div  class=\"module module-feature tb_e46q758 with-chart layout-icon-left size-small \" data-layout-mobile=\"icon-top\" data-layout-desktop=\"icon-left\" data-lazy=\"1\">\n        <div class=\"module-feature-image tf_textc tf_rel\">\n                            <a href=\"\/fr\/services\/evaluation-applications\" aria-label=\"\u00c9VALUATION D\u2019APPLICATIONS\">\n                        <span class=\"module-feature-chart-html5 tf_box tf_rel tf_inline_b\">\n                                    <svg class=\"tf_abs tf_w tf_h\">\n                    <circle class=\"tb_feature_fill\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke-width=\"2\"\/>\n                    <circle class=\"tb_feature_stroke\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke=\"#20232e\" stroke-width=\"2\" data-progress=\"100\" stroke-dasharray=\"0,10000\"\/>\n                                        <\/svg>\n                                <span class=\"chart-html5-circle tf_w tf_h\">\n                    <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/APP.png\" width=\"100\" height=\"100\" style=\"width:calc(100% - 4px);height:calc(100% - 4px)\" alt=\"\u00c9VALUATION D\u2019APPLICATIONS\">                                    <\/span>\n\n                \n            <\/span>\n                        <\/a>\n            <\/div>\n    <div class=\"module-feature-content tf_textc\">\n                    <h3 class=\"module-feature-title\">\n                            <a href=\"\/fr\/services\/evaluation-applications\" aria-label=\"\u00c9VALUATION D\u2019APPLICATIONS\">\u00c9VALUATION D\u2019APPLICATIONS<\/a>\n                        <\/h3>\n                    <div class=\"tb_text_wrap\">\n            <p>Les services d\u2019\u00e9valuation d\u2019applications de Orenda Security sont personnalis\u00e9s afin de s\u00e9curiser les applications essentielles \u00e0 votre entreprise et assurer la conformit\u00e9 avec les exigences de s\u00e9curit\u00e9 de votre industrie.<\/p>        <\/div>\n    <\/div>\n<\/div>\n<!-- \/module feature -->\n        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w gutter-none col_align_top tb_col_count_2 tb_7p3w759\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_q3ix759 first\">\n                    <!-- module feature -->\n<div  class=\"module module-feature tb_ly6w759 with-chart layout-icon-left size-small \" data-layout-mobile=\"icon-top\" data-layout-desktop=\"icon-left\" data-lazy=\"1\">\n        <div class=\"module-feature-image tf_textc tf_rel\">\n                            <a href=\"\/fr\/services\/tests-dynamiques\/\" aria-label=\"TESTS DYNAMIQUES (DAST)\">\n                        <span class=\"module-feature-chart-html5 tf_box tf_rel tf_inline_b\">\n                                    <svg class=\"tf_abs tf_w tf_h\">\n                    <circle class=\"tb_feature_fill\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke-width=\"2\"\/>\n                    <circle class=\"tb_feature_stroke\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke=\"#20232e\" stroke-width=\"2\" data-progress=\"100\" stroke-dasharray=\"0,10000\"\/>\n                                        <\/svg>\n                                <span class=\"chart-html5-circle tf_w tf_h\">\n                    <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/DAST.png\" width=\"100\" height=\"100\" style=\"width:calc(100% - 4px);height:calc(100% - 4px)\" alt=\"TESTS DYNAMIQUES (DAST)\">                                    <\/span>\n\n                \n            <\/span>\n                        <\/a>\n            <\/div>\n    <div class=\"module-feature-content tf_textc\">\n                    <h3 class=\"module-feature-title\">\n                            <a href=\"\/fr\/services\/tests-dynamiques\/\" aria-label=\"TESTS DYNAMIQUES (DAST)\">TESTS DYNAMIQUES (DAST)<\/a>\n                        <\/h3>\n                    <div class=\"tb_text_wrap\">\n            <p>Travaillez en partenariat avec Orenda Security pour vos tests dynamiques continus de s\u00e9curit\u00e9 des applications (DAST) et vous aurez acc\u00e8s \u00e0 des professionnels de la s\u00e9curit\u00e9 qui vous guideront pour s\u00e9curiser vos applications. Donnez des outils \u00e0 votre \u00e9quipe de d\u00e9veloppement et maintenez la rapidit\u00e9 de livraison de vos applications.<\/p>        <\/div>\n    <\/div>\n<\/div>\n<!-- \/module feature -->\n        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_0exk760 last\">\n                    <!-- module feature -->\n<div  class=\"module module-feature tb_5sdd760 with-chart layout-icon-left size-small \" data-layout-mobile=\"icon-top\" data-layout-desktop=\"icon-left\" data-lazy=\"1\">\n        <div class=\"module-feature-image tf_textc tf_rel\">\n                            <a href=\"\/fr\/services\/tests-statiques-securite-applications\" aria-label=\"TESTS STATIQUES DE S\u00c9CURIT\u00c9 DES APPLICATIONS (SAST)\">\n                        <span class=\"module-feature-chart-html5 tf_box tf_rel tf_inline_b\">\n                                    <svg class=\"tf_abs tf_w tf_h\">\n                    <circle class=\"tb_feature_fill\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke-width=\"2\"\/>\n                    <circle class=\"tb_feature_stroke\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke=\"#20232e\" stroke-width=\"2\" data-progress=\"100\" stroke-dasharray=\"0,10000\"\/>\n                                        <\/svg>\n                                <span class=\"chart-html5-circle tf_w tf_h\">\n                    <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/APPTEST.png\" width=\"100\" height=\"100\" style=\"width:calc(100% - 4px);height:calc(100% - 4px)\" alt=\"TESTS STATIQUES DE S\u00c9CURIT\u00c9 DES APPLICATIONS (SAST)\">                                    <\/span>\n\n                \n            <\/span>\n                        <\/a>\n            <\/div>\n    <div class=\"module-feature-content tf_textc\">\n                    <h3 class=\"module-feature-title\">\n                            <a href=\"\/fr\/services\/tests-statiques-securite-applications\" aria-label=\"TESTS STATIQUES DE S\u00c9CURIT\u00c9 DES APPLICATIONS (SAST)\">TESTS STATIQUES DE S\u00c9CURIT\u00c9 DES APPLICATIONS (SAST)<\/a>\n                        <\/h3>\n                    <div class=\"tb_text_wrap\">\n            <p>Travaillez en partenariat avec Orenda Security pour vos besoins de tests statiques de s\u00e9curit\u00e9 des applications (SAST). Que vous ayez besoin de tests SAST maintenant ou que vous ayez un outil en t\u00eate et une vision sur comment vous aimeriez l\u2019implanter, ou si vous avez besoin d\u2019aide pour d\u00e9marrer, laissez nos professionnels en s\u00e9curit\u00e9 des applications vous aidez \u00e0 instaurer votre s\u00e9curit\u00e9.<\/p>        <\/div>\n    <\/div>\n<\/div>\n<!-- \/module feature -->\n        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w gutter-none col_align_top tb_col_count_2 tb_orwo760\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_npre761 first\">\n                    <!-- module feature -->\n<div  class=\"module module-feature tb_2ic6761 with-chart layout-icon-left size-small \" data-layout-mobile=\"icon-top\" data-layout-desktop=\"icon-left\" data-lazy=\"1\">\n        <div class=\"module-feature-image tf_textc tf_rel\">\n                            <a href=\"\/fr\/services\/modelisation-menaces\/\" aria-label=\"MOD\u00c9LISATION DE MENACES\">\n                        <span class=\"module-feature-chart-html5 tf_box tf_rel tf_inline_b\">\n                                    <svg class=\"tf_abs tf_w tf_h\">\n                    <circle class=\"tb_feature_fill\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke-width=\"2\"\/>\n                    <circle class=\"tb_feature_stroke\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke=\"#20232e\" stroke-width=\"2\" data-progress=\"100\" stroke-dasharray=\"0,10000\"\/>\n                                        <\/svg>\n                                <span class=\"chart-html5-circle tf_w tf_h\">\n                    <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/VULNERABILITY.png\" width=\"100\" height=\"100\" style=\"width:calc(100% - 4px);height:calc(100% - 4px)\" alt=\"MOD\u00c9LISATION DE MENACES\">                                    <\/span>\n\n                \n            <\/span>\n                        <\/a>\n            <\/div>\n    <div class=\"module-feature-content tf_textc\">\n                    <h3 class=\"module-feature-title\">\n                            <a href=\"\/fr\/services\/modelisation-menaces\/\" aria-label=\"MOD\u00c9LISATION DE MENACES\">MOD\u00c9LISATION DE MENACES<\/a>\n                        <\/h3>\n                    <div class=\"tb_text_wrap\">\n            <p>Travaillez en partenariat avec Orenda Security pour d\u00e9buter avec la mod\u00e9lisation de menaces. La mod\u00e9lisation de menaces peut sembler un concept abstrait aujourd\u2019hui mais nos professionnels ont une exp\u00e9rience \u00e9prouv\u00e9e dans le d\u00e9veloppement de ces habilet\u00e9s dans plusieurs environnements, industries et mod\u00e8les de livraison. Nos professionnels en mod\u00e9lisation de menaces accompagnent votre \u00e9quipe dans chaque \u00e9tape d\u2019apprentissage et de pratique pour rencontrer vos processus et mod\u00e8les de livraison.<\/p>        <\/div>\n    <\/div>\n<\/div>\n<!-- \/module feature -->\n        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_81es761 last\">\n                    <!-- module feature -->\n<div  class=\"module module-feature tb_4ejt761 with-chart layout-icon-left size-small \" data-layout-mobile=\"icon-top\" data-layout-desktop=\"icon-left\" data-lazy=\"1\">\n        <div class=\"module-feature-image tf_textc tf_rel\">\n                            <a href=\"\/fr\/services\/evaluation-vulnerabilite\/\" aria-label=\"\u00c9VALUATION DE LA VULN\u00c9RABILIT\u00c9\">\n                        <span class=\"module-feature-chart-html5 tf_box tf_rel tf_inline_b\">\n                                    <svg class=\"tf_abs tf_w tf_h\">\n                    <circle class=\"tb_feature_fill\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke-width=\"2\"\/>\n                    <circle class=\"tb_feature_stroke\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke=\"#20232e\" stroke-width=\"2\" data-progress=\"100\" stroke-dasharray=\"0,10000\"\/>\n                                        <\/svg>\n                                <span class=\"chart-html5-circle tf_w tf_h\">\n                    <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/VULNERABILITY.png\" width=\"100\" height=\"100\" style=\"width:calc(100% - 4px);height:calc(100% - 4px)\" alt=\"\u00c9VALUATION DE LA VULN\u00c9RABILIT\u00c9\">                                    <\/span>\n\n                \n            <\/span>\n                        <\/a>\n            <\/div>\n    <div class=\"module-feature-content tf_textc\">\n                    <h3 class=\"module-feature-title\">\n                            <a href=\"\/fr\/services\/evaluation-vulnerabilite\/\" aria-label=\"\u00c9VALUATION DE LA VULN\u00c9RABILIT\u00c9\">\u00c9VALUATION DE LA VULN\u00c9RABILIT\u00c9<\/a>\n                        <\/h3>\n                    <div class=\"tb_text_wrap\">\n            <p><strong>\u00c9valuation des vuln\u00e9rabilit\u00e9s (VA) et gestion des vuln\u00e9rabilit\u00e9s (VM)<\/strong><br \/>Une \u00e9valuation des vuln\u00e9rabilit\u00e9s offre une repr\u00e9sentation pr\u00e9cise de la posture de s\u00e9curit\u00e9 d\u2019une organisation \u00e0 un moment pr\u00e9cis. Ce n\u2019est cependant pas suffisant. Il doit y avoir un m\u00e9canisme int\u00e9gr\u00e9 aux proc\u00e9dures pour s\u2019assurer que le processus d\u2019\u00e9valuation des vuln\u00e9rabilit\u00e9s se poursuive sur une base continue. C\u2019est la seule fa\u00e7on de minimiser r\u00e9ellement le risque global.<\/p>        <\/div>\n    <\/div>\n<\/div>\n<!-- \/module feature -->\n        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w gutter-none col_align_top tb_col_count_2 tb_uumc762\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_rpke762 first\">\n                    <!-- module feature -->\n<div  class=\"module module-feature tb_46tr762 with-chart layout-icon-left size-small \" data-layout-mobile=\"icon-top\" data-layout-desktop=\"icon-left\" data-lazy=\"1\">\n        <div class=\"module-feature-image tf_textc tf_rel\">\n                            <a href=\"\/fr\/services\/securite-infonuagique\/\" aria-label=\"S\u00c9CURIT\u00c9 INFONUAGIQUE\">\n                        <span class=\"module-feature-chart-html5 tf_box tf_rel tf_inline_b\">\n                                    <svg class=\"tf_abs tf_w tf_h\">\n                    <circle class=\"tb_feature_fill\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke-width=\"2\"\/>\n                    <circle class=\"tb_feature_stroke\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke=\"#20232e\" stroke-width=\"2\" data-progress=\"100\" stroke-dasharray=\"0,10000\"\/>\n                                        <\/svg>\n                                <span class=\"chart-html5-circle tf_w tf_h\">\n                    <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/CLOUD.png\" width=\"100\" height=\"100\" style=\"width:calc(100% - 4px);height:calc(100% - 4px)\" alt=\"S\u00c9CURIT\u00c9 INFONUAGIQUE\">                                    <\/span>\n\n                \n            <\/span>\n                        <\/a>\n            <\/div>\n    <div class=\"module-feature-content tf_textc\">\n                    <h3 class=\"module-feature-title\">\n                            <a href=\"\/fr\/services\/securite-infonuagique\/\" aria-label=\"S\u00c9CURIT\u00c9 INFONUAGIQUE\">S\u00c9CURIT\u00c9 INFONUAGIQUE<\/a>\n                        <\/h3>\n                    <div class=\"tb_text_wrap\">\n            <p>Les services d\u2019\u00e9valuation de Orenda Security simulent des tentatives r\u00e9elles d\u2019intrusion dans vos r\u00e9seaux, applications et environnements infonuagiques.<\/p>        <\/div>\n    <\/div>\n<\/div>\n<!-- \/module feature -->\n        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_hcj9762 last\">\n                            <\/div>\n                    <\/div>\n                <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_q77c725 tf_w\">\n                        <div class=\"row_inner gutter-none direction_rtl col_align_bottom tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_5h22763 first\">\n                    <!-- module template_part -->\n<div  class=\"module module-layout-part tb_ki2s763 \">\n    <div class=\"tb_layout_part_wrap tf_w\"><!--themify_builder_content-->\n    <div  class=\"themify_builder_content themify_builder_content-738 themify_builder not_editable_builder in_the_loop\" data-postid=\"738\">\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_svel459 tf_w\">\n                        <div class=\"row_inner col_align_bottom gutter-none tb_col_count_2 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col4-2 tb_bpxj465 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_gis7465 image-top   auto_fullwidth tf_mw\" data-lazy=\"1\" data-parallax-element-speed=\"2\" data-lax-translate-y=\"vh 1,0 -140\" data-lax=\"true\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/touch.jpg\" width=\"500\" height=\"430\" title=\"Services de tests d\u2019intrusion\" alt=\"Services de tests d\u2019intrusion\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col4-2 tb_kma3460 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_dth6463   \" data-lazy=\"1\" data-parallax-element-speed=\"1\" data-lax-translate-y=\"vh 1,0 -70\" data-lax=\"true\">\n        <div  class=\"tb_text_wrap\">\n        <h2>CONTACTEZ-NOUS!<\/h2><p>Contactez-nous pour en apprendre davantage sur les renseignements en s\u00e9curit\u00e9.<\/p>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module buttons -->\n<div  class=\"module module-buttons tb_3lk6368 buttons-horizontal outline   circle\" data-lazy=\"1\" data-lax-translate-y=\"(vh*1) 0,(vh*0) -70\" data-lax=\"true\">\n        <div class=\"module-buttons-item tf_in_flx\">\n                        <a href=\"\/fr\/contact\/\" class=\"ui builder_button tf_in_flx tb_default_color\" >\n                                                CONTACTEZ-NOUS                                        <\/a>\n                <\/div>\n            <\/div>\n<!-- \/module buttons -->\n        <\/div>\n                        <\/div>\n        <\/div>\n            <\/div>\n<!--\/themify_builder_content--><\/div>\n<\/div>\n<!-- \/module template_part -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-css_id=\"j2ds725\" data-lazy=\"1\" class=\"module_row themify_builder_row fullwidth tb_j2ds725 tf_w\">\n            <span  class=\"builder_row_cover tf_abs\" data-lazy=\"1\"><\/span>            <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_9ft0763 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_ek29764  repeat \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>T\u00e9moignages<\/h2>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module image -->\n<div  class=\"module module-image tb_7in9764 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/themify.me\/demo\/themes\/predesigned-rows\/files\/2018\/06\/testimonial-stars.png\" width=\"95\" height=\"15\" title=\"Services de tests d\u2019intrusion\" alt=\"Services de tests d\u2019intrusion\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image --><!-- module template_part -->\n<div  class=\"module module-layout-part tb_32o4642 \">\n    <div class=\"tb_layout_part_wrap tf_w\"><!--themify_builder_content-->\n    <div  class=\"themify_builder_content themify_builder_content-1243 themify_builder not_editable_builder in_the_loop\" data-postid=\"1243\">\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_0gxs530 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_uk2j050 first\">\n                    <div  class=\"module themify_builder_slider_wrap tf_clearfix module-testimonial-slider tb_gji9600 testimonials image-bottom themify_builder_slider_vertical  wow\" data-tf-animation=\"fadeInUp\" data-lazy=\"1\">\n        <div class=\"themify_builder_slider tf_carousel tf_swiper-container tf_rel tf_overflow\" data-lazy=\"1\"        data-visible=\"1\"\n        data-tab-visible=\"1\"\n        data-mob-visible=\"1\"\n        data-scroll=\"1\"\n                    data-nav_out=\"1\"\n                            data-auto=\"3000\"\n            data-controller=\"0\"\n            data-pause_hover=\"1\"\n                data-speed=\"normal\"\n        data-wrapvar=\"1\"\n        data-slider_nav=\"1\"\n        data-pager=\"1\"\n        data-effect=\"fade\" \n        data-height=\"auto\"\n        data-css_url=\"https:\/\/orendasecurity.com\/wp-content\/themes\/themify-ultra\/themify\/themify-builder\/css\/modules\/sliders\/carousel,https:\/\/orendasecurity.com\/wp-content\/themes\/themify-ultra\/themify\/themify-builder\/css\/modules\/sliders\/testimonial-slider\"\n                    >\n        <div class=\"tf_swiper-wrapper tf_lazy tf_rel tf_w tf_h tf_textc\">\n                <div class=\"post tf_swiper-slide\">            <div class=\"testimonial-item\" style=\"margin-left:50px;margin-right:50px;\">\n                                <div class=\"testimonial-content\">\n                                            <h3 class=\"testimonial-title\">Expertise technique et \u00e9valuations de grande qualit\u00e9<\/h3>\n                                                                                    <div class=\"testimonial-entry-content\">\n                            <p>Orenda se sont av\u00e9r\u00e9s un partenaire fiable pour AMA et nous ont aid\u00e9 \u00e0 d\u00e9velopper et livrer des applications s\u00e9curis\u00e9es \u00e0 tous nos membres AMA. Je recommande Orenda Security aux autres clubs AAA et CAA sur la base d\u2019une solide relation de travail avec AMA, pour leur expertise technique et leur excellente r\u00e9putation dans la livraison d\u2019\u00e9valuations de grande qualit\u00e9.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-340\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/AMA-300x72.png\" alt=\"\" width=\"150\" height=\"36\" srcset=\"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/AMA-300x72.png 300w, https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/AMA-768x185.png 768w, https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/AMA-1024x247.png 1024w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>                        <\/div>\n                                        \n                                            <div class=\"testimonial-author\">\n                                                            <div class=\"person-name\">Collin Moody<\/div>\n                                                                                        <span class=\"person-position\">Directeur principal de l\u2019information (CIO)<\/span>\n                                                                                        <div class=\"person-company\">\n                                                                            Alberta Motor Association                                                                    <\/div>\n                                                    <\/div>\n                                    <\/div>\n            <\/div>\n        <\/div><!-- .post -->            <div class=\"post tf_swiper-slide\" style=\"content-visibility:hidden\">            <div class=\"testimonial-item\" style=\"margin-left:50px;margin-right:50px;\">\n                                <div class=\"testimonial-content\">\n                                            <h3 class=\"testimonial-title\">Services de tests d\u2019intrusion de s\u00e9curit\u00e9 solides et fiables<\/h3>\n                                                                                    <div class=\"testimonial-entry-content\">\n                            <p>Il est difficile de trouver un partenaire fiable poss\u00e9dant une grande expertise technique! Orenda Security \u00e9taient exactement ce que nous recherchions. Ils nous ont aid\u00e9 \u00e0 am\u00e9liorer la posture de s\u00e9curit\u00e9 de notre produit et de notre application. Nous recommandons Orenda Security \u00e0 tout leader en s\u00e9curit\u00e9 qui recherche des services de tests d\u2019intrusion de s\u00e9curit\u00e9 solides et fiables.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-348\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/concert-cloud-150x150.png\" alt=\"\" width=\"128\" height=\"40\" srcset=\"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/concert-cloud-300x94.png 300w, https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/concert-cloud-768x240.png 768w, https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/concert-cloud.png 945w\" sizes=\"auto, (max-width: 128px) 100vw, 128px\" \/><\/p>                        <\/div>\n                                        \n                                            <div class=\"testimonial-author\">\n                                                                                                                    <div class=\"person-company\">\n                                                                            Concert Cloud Inc.                                                                    <\/div>\n                                                    <\/div>\n                                    <\/div>\n            <\/div>\n        <\/div><!-- .post -->            <div class=\"post tf_swiper-slide\" style=\"content-visibility:hidden\">            <div class=\"testimonial-item\" style=\"margin-left:50px;margin-right:50px;\">\n                                <div class=\"testimonial-content\">\n                                            <h3 class=\"testimonial-title\">Haut niveau d\u2019expertise dans la r\u00e9alisation de tests d\u2019intrusion d\u2019applications<\/h3>\n                                                                                    <div class=\"testimonial-entry-content\">\n                            <p>Orenda Security ont d\u00e9montr\u00e9 un haut niveau d\u2019expertise dans la r\u00e9alisation de tests d\u2019intrusion d\u2019applications. Leurs observations et recommandations \u00e9taient claires et r\u00e9alisables. Nous recommandons fortement Orenda Security \u00e0 toute entreprise qui recherche des services d\u2019\u00e9valuation de la s\u00e9curit\u00e9.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-652 aligncenter\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/08\/revolution-capital.png\" alt=\"\" width=\"90\" height=\"90\"><\/p>                        <\/div>\n                                        \n                                            <div class=\"testimonial-author\">\n                                                            <div class=\"person-name\">Colton Toscher<\/div>\n                                                                                        <span class=\"person-position\">Directeur principal de la technologie (CTO)<\/span>\n                                                                                        <div class=\"person-company\">\n                                                                            Revolution Capital                                                                     <\/div>\n                                                    <\/div>\n                                    <\/div>\n            <\/div>\n        <\/div><!-- .post -->                <\/div>\n    <\/div>\n<\/div>\n        <\/div>\n                        <\/div>\n        <\/div>\n            <\/div>\n<!--\/themify_builder_content--><\/div>\n<\/div>\n<!-- \/module template_part -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-css_id=\"agsr725\" data-lazy=\"1\" class=\"module_row themify_builder_row fullwidth tb_agsr725 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_v3cj764 first\">\n                    <!-- module template_part -->\n<div  class=\"module module-layout-part tb_2esm765 \">\n    <div class=\"tb_layout_part_wrap tf_w\"><!--themify_builder_content-->\n    <div  class=\"themify_builder_content themify_builder_content-745 themify_builder not_editable_builder in_the_loop\" data-postid=\"745\">\n                        <div  data-parallax-bg=\"desktop\" data-css_id=\"b5cn527\" data-lazy=\"1\" class=\"module_row themify_builder_row fullwidth_row_container tb_b5cn527 tf_w\">\n            <span  class=\"builder_row_cover tf_abs\" data-lazy=\"1\"><\/span>            <div class=\"row_inner col_align_middle tb_col_count_2 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col3-2 tb_th1l528 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_fvj3529   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>L\u2019HISTOIRE ET L\u2019\u00c9QUIPE <br>DERRI\u00c8RE ORENDA SECURITY <sup>\u00ae<\/sup><\/h2>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module text -->\n<div  class=\"module module-text tb_94nx530   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Orenda Security <sup>\u00ae<\/sup> est une firme de s\u00e9curit\u00e9 informatique d\u2019\u00e9lite fond\u00e9e sur un esprit d\u2019int\u00e9grit\u00e9 et de partenariat avec notre \u00e9quipe et, surtout, nos clients.<\/p>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module buttons -->\n<div  class=\"module module-buttons tb_ae10530 buttons-horizontal outline   circle\" data-lazy=\"1\">\n        <div class=\"module-buttons-item tf_in_flx\">\n                        <a href=\"\/fr\/a-propos\/\" class=\"ui builder_button tf_in_flx tb_default_color\" >\n                                                \u00c0 PROPOS                                        <\/a>\n                <\/div>\n            <\/div>\n<!-- \/module buttons -->\n        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col3-1 tb_h2di530 last\">\n                            <\/div>\n                        <\/div>\n        <\/div>\n            <\/div>\n<!--\/themify_builder_content--><\/div>\n<\/div>\n<!-- \/module template_part -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>Services de tests d\u2019intrusion Les services d\u2019\u00e9valuation d\u2019Orenda Security simulent des tentatives r\u00e9elles d\u2019intrusion dans vos r\u00e9seaux, applications et environnements infonuagiques. DEMANDER UN DEVIS EN SAVOIR PLUS Orenda Security offre des tests d\u2019intrusion de grande qualit\u00e9 qui simulent les activit\u00e9s de r\u00e9els cyberpr\u00e9dateurs pour trouver des vuln\u00e9rabilit\u00e9s dans les syst\u00e8mes cibl\u00e9s et les exploiter dans [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":947,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-870","page","type-page","status-publish","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Services de tests d\u2019intrusion - Orenda Security<\/title>\n<meta name=\"description\" content=\"Orenda Security met en \u0153uvre des tests d&#039;intrusion pour localiser les vuln\u00e9rabilit\u00e9s dans les syst\u00e8mes cibles. Ce service est personnalisable pour r\u00e9pondre \u00e0 vos exigences de conformit\u00e9. Apprenez-en plus en nous contactant aujourd&#039;hui \u00e0 Info@orendasecurity.com\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/orendasecurity.com\/fr\/services\/tests-intrusion\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Services de tests d\u2019intrusion - Orenda Security\" \/>\n<meta property=\"og:description\" content=\"Orenda Security met en \u0153uvre des tests d&#039;intrusion pour localiser les vuln\u00e9rabilit\u00e9s dans les syst\u00e8mes cibles. Ce service est personnalisable pour r\u00e9pondre \u00e0 vos exigences de conformit\u00e9. Apprenez-en plus en nous contactant aujourd&#039;hui \u00e0 Info@orendasecurity.com\" \/>\n<meta property=\"og:url\" content=\"https:\/\/orendasecurity.com\/fr\/services\/tests-intrusion\/\" \/>\n<meta property=\"og:site_name\" content=\"Orenda Security\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-05T01:00:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/VULNERABILITY.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/tests-intrusion\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/tests-intrusion\\\/\",\"name\":\"Services de tests d\u2019intrusion - Orenda Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/tests-intrusion\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/tests-intrusion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/VULNERABILITY.png\",\"datePublished\":\"2019-10-27T18:50:00+00:00\",\"dateModified\":\"2019-12-05T01:00:41+00:00\",\"description\":\"Orenda Security met en \u0153uvre des tests d'intrusion pour localiser les vuln\u00e9rabilit\u00e9s dans les syst\u00e8mes cibles. Ce service est personnalisable pour r\u00e9pondre \u00e0 vos exigences de conformit\u00e9. Apprenez-en plus en nous contactant aujourd'hui \u00e0 Info@orendasecurity.com\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/tests-intrusion\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/tests-intrusion\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/tests-intrusion\\\/#primaryimage\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/VULNERABILITY.png\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/VULNERABILITY.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/tests-intrusion\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Services de tests d\u2019intrusion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"name\":\"Orenda Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/orendasecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\",\"name\":\"Orenda Security\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"width\":432,\"height\":173,\"caption\":\"Orenda Security\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Services de tests d\u2019intrusion - Orenda Security","description":"Orenda Security met en \u0153uvre des tests d'intrusion pour localiser les vuln\u00e9rabilit\u00e9s dans les syst\u00e8mes cibles. Ce service est personnalisable pour r\u00e9pondre \u00e0 vos exigences de conformit\u00e9. Apprenez-en plus en nous contactant aujourd'hui \u00e0 Info@orendasecurity.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/orendasecurity.com\/fr\/services\/tests-intrusion\/","og_locale":"fr_FR","og_type":"article","og_title":"Services de tests d\u2019intrusion - Orenda Security","og_description":"Orenda Security met en \u0153uvre des tests d'intrusion pour localiser les vuln\u00e9rabilit\u00e9s dans les syst\u00e8mes cibles. Ce service est personnalisable pour r\u00e9pondre \u00e0 vos exigences de conformit\u00e9. Apprenez-en plus en nous contactant aujourd'hui \u00e0 Info@orendasecurity.com","og_url":"https:\/\/orendasecurity.com\/fr\/services\/tests-intrusion\/","og_site_name":"Orenda Security","article_modified_time":"2019-12-05T01:00:41+00:00","og_image":[{"url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/VULNERABILITY.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/orendasecurity.com\/fr\/services\/tests-intrusion\/","url":"https:\/\/orendasecurity.com\/fr\/services\/tests-intrusion\/","name":"Services de tests d\u2019intrusion - Orenda Security","isPartOf":{"@id":"https:\/\/orendasecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/orendasecurity.com\/fr\/services\/tests-intrusion\/#primaryimage"},"image":{"@id":"https:\/\/orendasecurity.com\/fr\/services\/tests-intrusion\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/VULNERABILITY.png","datePublished":"2019-10-27T18:50:00+00:00","dateModified":"2019-12-05T01:00:41+00:00","description":"Orenda Security met en \u0153uvre des tests d'intrusion pour localiser les vuln\u00e9rabilit\u00e9s dans les syst\u00e8mes cibles. Ce service est personnalisable pour r\u00e9pondre \u00e0 vos exigences de conformit\u00e9. Apprenez-en plus en nous contactant aujourd'hui \u00e0 Info@orendasecurity.com","breadcrumb":{"@id":"https:\/\/orendasecurity.com\/fr\/services\/tests-intrusion\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/orendasecurity.com\/fr\/services\/tests-intrusion\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/fr\/services\/tests-intrusion\/#primaryimage","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/VULNERABILITY.png","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/VULNERABILITY.png"},{"@type":"BreadcrumbList","@id":"https:\/\/orendasecurity.com\/fr\/services\/tests-intrusion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/orendasecurity.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/orendasecurity.com\/fr\/services\/"},{"@type":"ListItem","position":3,"name":"Services de tests d\u2019intrusion"}]},{"@type":"WebSite","@id":"https:\/\/orendasecurity.com\/#website","url":"https:\/\/orendasecurity.com\/","name":"Orenda Security","description":"","publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/orendasecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/orendasecurity.com\/#organization","name":"Orenda Security","url":"https:\/\/orendasecurity.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","width":432,"height":173,"caption":"Orenda Security"},"image":{"@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/pages\/870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/comments?post=870"}],"version-history":[{"count":0,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/pages\/870\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/pages\/947"}],"wp:attachment":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/media?parent=870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}