{"id":879,"date":"2019-10-27T15:06:37","date_gmt":"2019-10-27T19:06:37","guid":{"rendered":"https:\/\/orendasecurity.com\/?page_id=879"},"modified":"2019-12-04T20:01:07","modified_gmt":"2019-12-05T01:01:07","slug":"evaluation-applications","status":"publish","type":"page","link":"https:\/\/orendasecurity.com\/fr\/services\/evaluation-applications\/","title":{"rendered":"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-879\" data-postid=\"879\" class=\"themify_builder_content themify_builder_content-879 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_tl7336 tb_first tf_w\">\n            <span  class=\"builder_row_cover tf_abs\" data-lazy=\"1\"><\/span><span class=\"tb_row_frame_wrap tf_overflow tf_abs\" data-lazy=\"1\"><span class=\"tb_row_frame tb_row_frame_bottom  tf_abs tf_hide tf_overflow tf_w\"><\/span><\/span>            <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_suku37 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_1 tb_9o2538\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col-full tb_1zf238 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_crdt38   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h1>Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications<\/h1>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_1 tb_vdmy39\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col-full tb_o38740 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_pwe440   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Les services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications de Orenda Security sont personnalis\u00e9s pour vous aider \u00e0 s\u00e9curiser les applications essentielles \u00e0 vos affaires et assurer leur conformit\u00e9 avec les exigences de s\u00e9curit\u00e9 de votre industrie.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_3 tb_d1j7762\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col3-1 tb_m8q9763 first\">\n                    <!-- module buttons -->\n<div  class=\"module module-buttons tb_r4ie763 buttons-horizontal solid  squared\" data-lazy=\"1\">\n        <div class=\"module-buttons-item tf_in_flx\">\n                        <a href=\"\/fr\/demander-un-devis\" class=\"ui builder_button tf_in_flx tb_default_color\" target=\"_blank\" rel=\"noopener\">\n                                                DEMANDER UN DEVIS                                        <\/a>\n                <\/div>\n            <\/div>\n<!-- \/module buttons -->\n        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col3-1 tb_1b24764\">\n                    <!-- module buttons -->\n<div  class=\"module module-buttons tb_tzlb764 buttons-horizontal solid  squared\" data-lazy=\"1\">\n        <div class=\"module-buttons-item tf_in_flx\">\n                        <a href=\"#services\" class=\"ui builder_button tf_in_flx tb_default_color\" >\n                                                EN SAVOIR PLUS                                        <\/a>\n                <\/div>\n            <\/div>\n<!-- \/module buttons -->\n        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col3-1 tb_qncq764 last\">\n                            <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_1 tb_iqs642\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col-full tb_eff642 first\">\n                    <!-- module icon -->\n<div  class=\"module module-icon tb_yt5p42  normal none icon_horizontal tf_textc hover-wow wow\" data-tf-animation_hover=\"flash\" data-tf-animation=\"flash\" data-lazy=\"1\">\n\t\t\t<div class=\"module-icon-item\">\n\t\t\t\t\t\t\t<a href=\"#services\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<em class=\"tf_boxtb_default_color\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t><svg  class=\"tf_fa tf-ti-angle-double-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-angle-double-down\" xlink:href=\"#tf-ti-angle-double-down\"><\/use><\/svg><\/em>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<!-- \/module icon -->\n        <\/div>\n                    <\/div>\n                <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-anchor=\"services\" data-lazy=\"1\" class=\"module_row themify_builder_row tb_has_section tb_section-services tb_43hk36 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_v3sm43 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_g6fd43  repeat \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>La s\u00e9curisation des applications repr\u00e9sente un d\u00e9fi plus grand que jamais alors que la rapidit\u00e9 de d\u00e9veloppement des applications continue d\u2019augmenter. L\u2019adoption des technologies infonuagiques, les pratiques de d\u00e9veloppement agile, le devops et les nouvelles technologies offrent tous une valeur d\u2019affaires int\u00e9ressante, mais la vitesse des changements a un impact important sur la capacit\u00e9 de s\u00e9curiser ad\u00e9quatement les applications essentielles aux affaires. Une strat\u00e9gie ad\u00e9quate d\u2019\u00e9valuation de la s\u00e9curit\u00e9, incluant des tests manuels et automatis\u00e9s durant le cycle de d\u00e9veloppement des syst\u00e8mes (SDLC) et en production, est essentielle pour mitiger les risques; notre \u00e9quipe peut vous aider en d\u00e9veloppant et en r\u00e9alisant une solution de tests personnalis\u00e9e pour r\u00e9pondre \u00e0 vos besoins d\u2019affaires.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row accounting-services accounting-services-border tb_ialn36 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_bohr44 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_middle tb_col_count_2 tb_dnsg44\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-1 tb_6x9j44 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_e1ae44 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/PENTEST.png\" width=\"208\" height=\"208\" title=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\" alt=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-3 tb_65ba45 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_5cpo45   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>Processus de tests d\u2019intrusion<\/h2><p>Les tests d\u2019intrusion et l\u2019\u00e9valuation des vuln\u00e9rabilit\u00e9s du syst\u00e8me et du r\u00e9seau d\u2019infrastructure sont essentiels pour d\u00e9celer les vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 qui sont utilis\u00e9es pour lancer une cyberattaque via l\u2019internet. Les tests de r\u00e9seau interne ou l\u2019\u00e9valuation de s\u00e9curit\u00e9 des syst\u00e8mes faisant face \u00e0 l\u2019internet permettent de d\u00e9couvrir les services de r\u00e9seau vuln\u00e9rables qui peuvent \u00eatre exploit\u00e9s par des sources inconnues de menaces.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w gutter-narrow col_align_top tb_col_count_2 tb_vxkv45\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_1gjn47 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_592447 image-center   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/profiling-and-discovery.png\" width=\"120\" height=\"220\" title=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\" alt=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image --><!-- module text -->\n<div  class=\"module module-text tb_y8ck47   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Phase 1<\/p><h3>Profilage et d\u00e9couverte<\/h3><p>\u00c0 cette \u00e9tape, le profilage de l\u2019application web cibl\u00e9e est r\u00e9alis\u00e9 en identifiant les points d\u2019acc\u00e8s des utilisateurs, en obtenant une compr\u00e9hension des m\u00e9canismes de s\u00e9curit\u00e9 de base utilis\u00e9s par l\u2019application, ainsi que les interface avec les applications internes ou externes, en identifiant les r\u00f4les avec des niveaux de confiance variables et en d\u00e9terminant le flux de donn\u00e9es avec indication sur les limites de privil\u00e8ge.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_3g8e48 last\">\n                    <!-- module divider -->\n<div  class=\"module tf_mw module-divider tb_1x0249 solid    hide-desktop hide-tablet\" style=\"border-width: 1px;border-color: #000000;margin-top: 20px;margin-bottom: 20px;\" data-lazy=\"1\">\n    <\/div>\n<!-- \/module divider -->\n<!-- module image -->\n<div  class=\"module module-image tb_fgrj49 image-center   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/security-scanning.png\" width=\"120\" height=\"220\" title=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\" alt=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image --><!-- module text -->\n<div  class=\"module module-text tb_rrc449   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Phase 2<\/p><h3>Balayage automatis\u00e9 de la s\u00e9curit\u00e9 des applications<\/h3><p>Des scanners automatis\u00e9s de vuln\u00e9rabilit\u00e9s d\u2019application (commerciaux ou de code source libre) sont utilis\u00e9s pour d\u00e9tecter des vuln\u00e9rabilit\u00e9s sp\u00e9cifiques aux applications, selon toutes les r\u00e9f\u00e9rences OWASP, WASC et SANS.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n        <!-- module divider -->\n<div  class=\"module tf_mw module-divider tb_bl7o49 solid   \" style=\"border-width: 1px;border-color: #000000;margin-top: 20px;margin-bottom: 20px;\" data-lazy=\"1\">\n    <\/div>\n<!-- \/module divider -->\n        <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w gutter-narrow col_align_top tb_col_count_2 tb_zxb749\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_nq6350 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_0r5d50 image-center   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/application-vulnerability-determination.png\" width=\"120\" height=\"220\" title=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\" alt=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image --><!-- module text -->\n<div  class=\"module module-text tb_s4s550   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Phase 3<\/p><h3>D\u00e9termination des vuln\u00e9rabilit\u00e9s des applications<\/h3><p>Cette \u00e9tape implique une approche hybride compl\u00e8te d\u2019identification des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 des applications web \u00e0 l\u2019aide d\u2019outils et de scripts automatis\u00e9s, ainsi qu\u2019une \u00e9valuation manuelle pour \u00e9liminer les faux-positifs et les faux-n\u00e9gatifs. L\u2019\u00e9valuation manuelle utilise diff\u00e9rentes bases de donn\u00e9es de vuln\u00e9rabilit\u00e9s pour identifier les vuln\u00e9rabilit\u00e9s qui n\u2019auraient pas \u00e9t\u00e9 d\u00e9tect\u00e9es pendant le balayage automatis\u00e9, en plus de v\u00e9rifier la s\u00e9curit\u00e9 des failles de logique d\u2019affaires, les contr\u00f4les d\u2019acc\u00e8s rompus et plus.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_hyq250 last\">\n                    <!-- module divider -->\n<div  class=\"module tf_mw module-divider tb_qezw51 solid    hide-desktop hide-tablet\" style=\"border-width: 1px;border-color: #000000;margin-top: 20px;margin-bottom: 20px;\" data-lazy=\"1\">\n    <\/div>\n<!-- \/module divider -->\n<!-- module image -->\n<div  class=\"module module-image tb_c1xy51 image-center   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/application-vulnerability-exploitation.png\" width=\"120\" height=\"220\" title=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\" alt=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image --><!-- module text -->\n<div  class=\"module module-text tb_1fit51   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Phase 4<\/p><h3>Exploitation des vuln\u00e9rabilit\u00e9s des applications<\/h3><p>L\u2019objectif principal de cette phase est d\u2019utiliser des techniques manuelles de tests de s\u00e9curit\u00e9 pour exploiter les syst\u00e8mes qui comprennent plusieurs exploits pour \u00e9valuer les mesures de renforcement des applications, les enjeux de cryptographie, les contr\u00f4les d\u2019authentification et d\u2019autorisation, le module de gestion des sessions, les failles de logique d\u2019affaires et diff\u00e9rentes mesures de validation. Les sc\u00e9narios d\u2019attaque des environnements de production utiliseront une combinaison de charge d\u2019exploits en strict accord avec les r\u00e8gles \u00e9tablies du mandat.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n        <!-- module divider -->\n<div  class=\"module tf_mw module-divider tb_02b351 solid   \" style=\"border-width: 1px;border-color: #000000;margin-top: 20px;margin-bottom: 20px;\" data-lazy=\"1\">\n    <\/div>\n<!-- \/module divider -->\n        <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w gutter-narrow col_align_top tb_col_count_2 tb_v1ao51\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_27dc52 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_yn5b52 image-center   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/reporting-vulnerability.png\" width=\"120\" height=\"220\" title=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\" alt=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image --><!-- module text -->\n<div  class=\"module module-text tb_ijy252   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Phase 5<\/p><h3>Rapports<\/h3><p>Toutes les vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 exploitables de l\u2019application web cibl\u00e9e sont enregistr\u00e9es avec leurs valeurs CVSS v2 associ\u00e9es et consign\u00e9es dans un rapport. Les vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 identifi\u00e9es sont \u00e9valu\u00e9es minutieusement et consign\u00e9es dans un rapport avec les mesures de mitigation ou les recommandations appropri\u00e9es.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_ey4a52 last\">\n                    <!-- module divider -->\n<div  class=\"module tf_mw module-divider tb_nfyc52 solid    hide-desktop hide-tablet\" style=\"border-width: 1px;border-color: #000000;margin-top: 20px;margin-bottom: 20px;\" data-lazy=\"1\">\n    <\/div>\n<!-- \/module divider -->\n<!-- module image -->\n<div  class=\"module module-image tb_y7on53 image-center   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/remediation-and-reassessment.png\" width=\"120\" height=\"220\" title=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\" alt=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image --><!-- module text -->\n<div  class=\"module module-text tb_o8ob53   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Phase 6<\/p><h3>Rem\u00e9diation et r\u00e9\u00e9valuation<\/h3><p>La rem\u00e9diation implique l\u2019assistance pour rem\u00e9dier aux vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 des applications qui ont \u00e9t\u00e9 identifi\u00e9es. Apr\u00e8s la rem\u00e9diation, une r\u00e9\u00e9valuation sera r\u00e9alis\u00e9e afin de valider l\u2019efficacit\u00e9 des contremesures de s\u00e9curit\u00e9 des applications utilis\u00e9es pour mitiger les vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 mentionn\u00e9es dans le rapport.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row accounting-services accounting-services-border tb_onsu36 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_fw1h53 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_middle tb_col_count_2 tb_xs7p54\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-1 tb_od1554 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_25it54 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/APP.png\" width=\"207\" height=\"207\" title=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\" alt=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-3 tb_nk8v54 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_jull54   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>Applications web<\/h2><p>Notre \u00e9quipe commence par une \u00e9valuation de la conception de votre application web et \u00e9value la probabilit\u00e9 de rencontrer des enjeux de s\u00e9curit\u00e9 par une analyse de la mod\u00e9lisation des menaces. Les tests manuels sont la principale m\u00e9thode de test utilis\u00e9e mais des tests d\u2019intrusion automatis\u00e9s sont \u00e9galement r\u00e9alis\u00e9s. Orenda Security mettra l\u2019emphase sur l\u2019attaque, la modification et le d\u00e9tournement des interactions client-serveur, les services web et les APIs utilis\u00e9s par les applications, et pourra m\u00eame cibler les donn\u00e9es d\u2019entreprise utilis\u00e9es dans vos syst\u00e8mes de bases de donn\u00e9es.<\/p><p>Nos experts d\u00e9vou\u00e9s trouveront et tenteront d\u2019exploiter les failles de s\u00e9curit\u00e9 qui pourraient permettre l\u2019\u00e9l\u00e9vation de privil\u00e8ges, la divulgation de renseignements confidentiels, l\u2019injection de code malveillant \u00e0 l\u2019int\u00e9rieur de composantes fiables, des failles de logique et d\u2019autres conditions habituellement reconnues pour pr\u00e9senter des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9. Cette approche nous permet d\u2019identifier tous les vecteurs d\u2019attaque existants et de d\u00e9montrer les impacts qu\u2019aurait une attaque r\u00e9elle. Orenda Security classe les vuln\u00e9rabilit\u00e9s selon la plus r\u00e9cente liste de l\u2019OWASP des 10 plus importantes failles de s\u00e9curit\u00e9 des applications web. Les \u00e9tapes principales incluent : L\u2019\u00e9valuation de la s\u00e9curit\u00e9 de votre r\u00e9seau externe comprend plusieurs \u00e9tapes. Les principales \u00e9tapes incluent :<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_1 tb_uawk55\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col-full tb_5c6455 first\">\n                    <!-- module accordion -->\n<div  class=\"module module-accordion tb_txua55 \" data-behavior=\"toggle\" data-lazy=\"1\">\n    \n    <ul class=\"ui module-accordion  shadow tb_default_color\">\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-txua55-0\" class=\"tb_title_accordion\" aria-controls=\"acc-txua55-0-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Identification des vuln\u00e9rabilit\u00e9s des applications<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-txua55-0-content\" data-id=\"acc-txua55-0\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Identification des vuln\u00e9rabilit\u00e9s d\u2019applications standards et des erreurs de logique d\u2019affaires qui ne peuvent pas \u00eatre d\u00e9cel\u00e9es lors des balayages automatis\u00e9s (tests authentifi\u00e9s et non-authentifi\u00e9s).<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-txua55-1\" class=\"tb_title_accordion\" aria-controls=\"acc-txua55-1-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Analyse en profondeur<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-txua55-1-content\" data-id=\"acc-txua55-1\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>L\u2019analyse en profondeur des risques d\u2019applications au-del\u00e0 des tests d\u2019intrusion habituels. La formulation claire des impacts de l\u2019exploitation des vuln\u00e9rabilit\u00e9s des applications identifi\u00e9es est essentielle dans l\u2019\u00e9laboration d\u2019une strat\u00e9gie de mitigation des risques.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-txua55-2\" class=\"tb_title_accordion\" aria-controls=\"acc-txua55-2-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Recommandations<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-txua55-2-content\" data-id=\"acc-txua55-2\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Nous livrons des recommandations d\u00e9taill\u00e9es pour mitiger les risques identifi\u00e9s, mais d\u00e9poser un rapport d\u00e9taill\u00e9 des observations ne suffit pas. Notre approche collaborative consiste \u00e0 pr\u00e9senter des orientations r\u00e9alisables pour une rem\u00e9diation rapide tout en vous aidant \u00e0 \u00e9laborer des strat\u00e9gies de protection am\u00e9lior\u00e9es pour vos applications.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-txua55-3\" class=\"tb_title_accordion\" aria-controls=\"acc-txua55-3-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Analyse<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-txua55-3-content\" data-id=\"acc-txua55-3\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>L\u2019analyse d\u2019affaires fournit une perspective de direction et des recommandations de strat\u00e9gies pour une mitigation des risques \u00e0 court et \u00e0 long terme.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n        <\/ul>\n\n<\/div><!-- \/module accordion -->        <\/div>\n                    <\/div>\n                <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row accounting-services accounting-services-border tb_an8536 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_76ls56 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_middle tb_col_count_2 tb_kdep56\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-1 tb_4z6d56 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_86gd56 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/network.png\" width=\"208\" height=\"208\" title=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\" alt=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-3 tb_v0jz56 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_h12p56   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>Applications mobiles<\/h2><p>Les tests d\u2019intrusion d\u2019applications mobiles de Orenda Security sont exhaustifs et d\u00e9butent par une revue des documents techniques de conception, des diagrammes de processus et de l\u2019architecture de s\u00e9curit\u00e9 des applications, afin d\u2019identifier les surfaces d\u2019attaque des applications.<\/p><p>Les vuln\u00e9rabilit\u00e9s identifi\u00e9es sont repr\u00e9sent\u00e9es selon la liste des 10 plus importantes failles de s\u00e9curit\u00e9 des applications de l\u2019OWASP:<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_1 tb_t0w457\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col-full tb_1b6857 first\">\n                    <!-- module accordion -->\n<div  class=\"module module-accordion tb_bm2z57 \" data-behavior=\"toggle\" data-lazy=\"1\">\n    \n    <ul class=\"ui module-accordion  shadow tb_default_color\">\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-bm2z57-0\" class=\"tb_title_accordion\" aria-controls=\"acc-bm2z57-0-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Utilisation inad\u00e9quate de la plateforme<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-bm2z57-0-content\" data-id=\"acc-bm2z57-0\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Cette faille inclut la mauvaise utilisation d\u2019une fonction de la plateforme ou l\u2019omission d\u2019utiliser les contr\u00f4les de s\u00e9curit\u00e9 de la plateforme pour prot\u00e9ger le service ou un API. Un cyberpr\u00e9dateur pourrait introduire des saisies malveillantes ou une s\u00e9quence inattendue d\u2019\u00e9v\u00e9nements par un point d\u2019acc\u00e8s vuln\u00e9rable.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-bm2z57-1\" class=\"tb_title_accordion\" aria-controls=\"acc-bm2z57-1-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Stockage non s\u00e9curis\u00e9 de donn\u00e9es <\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-bm2z57-1-content\" data-id=\"acc-bm2z57-1\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Les vuln\u00e9rabilit\u00e9s de stockage non s\u00e9curis\u00e9 de donn\u00e9es ouvrent g\u00e9n\u00e9ralement la porte aux risques d\u2019affaires suivants pour l\u2019organisation qui poss\u00e8de une application \u00e0 risque: vol d\u2019identit\u00e9, fraude, pr\u00e9judice \u00e0 la r\u00e9putation, violation des politiques externes (PCI) ou pertes mat\u00e9rielles.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-bm2z57-2\" class=\"tb_title_accordion\" aria-controls=\"acc-bm2z57-2-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Communications non s\u00e9curis\u00e9es<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-bm2z57-2-content\" data-id=\"acc-bm2z57-2\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Cette faille pourrait permettre aux agents de menace d\u2019exploiter des vuln\u00e9rabilit\u00e9s pour intercepter des donn\u00e9es sensibles pendant qu\u2019elles sont transmises via un r\u00e9seau local, un r\u00e9seau wifi compromis, un transporteur ou des appareils r\u00e9seau expos\u00e9s.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-bm2z57-3\" class=\"tb_title_accordion\" aria-controls=\"acc-bm2z57-3-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Authentification non s\u00e9curis\u00e9e<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-bm2z57-3-content\" data-id=\"acc-bm2z57-3\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Cette faille provient de m\u00e9canismes d\u2019authentification insuffisants ou inexistants qui pourraient permettre \u00e0 une personne mal intentionn\u00e9e d\u2019ex\u00e9cuter, de fa\u00e7on anonyme, une fonction de l\u2019application mobile ou du serveur d\u2019arri\u00e8re-plan utilis\u00e9 par l\u2019application mobile, sans qu\u2019il soit possible de v\u00e9rifier l\u2019identit\u00e9 de l\u2019utilisateur.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-bm2z57-4\" class=\"tb_title_accordion\" aria-controls=\"acc-bm2z57-4-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Cryptographie insuffisante<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-bm2z57-4-content\" data-id=\"acc-bm2z57-4\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Cette faille pourrait permettre un acc\u00e8s non-autoris\u00e9 \u00e0 des donn\u00e9es sensibles de l\u2019appareil mobile menant \u00e0 une violation de la confidentialit\u00e9, un vol de renseignements ou un pr\u00e9judice \u00e0 la r\u00e9putation.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-bm2z57-5\" class=\"tb_title_accordion\" aria-controls=\"acc-bm2z57-5-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Autorisation non s\u00e9curis\u00e9e<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-bm2z57-5-content\" data-id=\"acc-bm2z57-5\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Cette faille pourrait permettre l\u2019ex\u00e9cution sur-privil\u00e9gi\u00e9e d\u2019une fonction d\u2019administration locale ou \u00e0 distance, menant \u00e0 des acc\u00e8s \u00e0 des donn\u00e9es sensibles ou \u00e0 la destruction de syst\u00e8mes.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-bm2z57-6\" class=\"tb_title_accordion\" aria-controls=\"acc-bm2z57-6-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Qualit\u00e9 du code client<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-bm2z57-6-content\" data-id=\"acc-bm2z57-6\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Cette faille pourrait donner lieu \u00e0 des exploitations menant \u00e0 l\u2019ex\u00e9cution de code \u00e9tranger ou \u00e0 un d\u00e9ni de service sur des points d\u2019acc\u00e8s du serveur \u00e0 distance (et non sur l\u2018appareil mobile lui-m\u00eame).<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-bm2z57-7\" class=\"tb_title_accordion\" aria-controls=\"acc-bm2z57-7-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Alt\u00e9ration du code<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-bm2z57-7-content\" data-id=\"acc-bm2z57-7\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Cette faille pourrait donner lieu \u00e0 des exploitations menant \u00e0 de nouvelles fonctions non-autoris\u00e9es, \u00e0 du vol d\u2019identit\u00e9 ou de la fraude.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-bm2z57-8\" class=\"tb_title_accordion\" aria-controls=\"acc-bm2z57-8-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">R\u00e9troing\u00e9nierie<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-bm2z57-8-content\" data-id=\"acc-bm2z57-8\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Cette faille pourrait donner lieu \u00e0 des exploitations menant \u00e0 de la r\u00e9troing\u00e9nierie permettant de r\u00e9v\u00e9ler des renseignements sur les serveurs d\u2019arri\u00e8re-plan, r\u00e9v\u00e9ler des chiffres ou des constantes cryptographiques et voler de la propri\u00e9t\u00e9 intellectuelle.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-bm2z57-9\" class=\"tb_title_accordion\" aria-controls=\"acc-bm2z57-9-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-ti-arrow-circle-down\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-ti-arrow-circle-down\" xlink:href=\"#tf-ti-arrow-circle-down\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">Fonctionnalit\u00e9 ext\u00e9rieure<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-bm2z57-9-content\" data-id=\"acc-bm2z57-9\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Cette faille pourrait donner lieu \u00e0 des exploitations pouvant exposer comment les syst\u00e8mes d\u2019arri\u00e8re-plan fonctionnent ou mener \u00e0 l\u2019ex\u00e9cution de fonctions hautement privil\u00e9gi\u00e9es et non-autoris\u00e9es.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n        <\/ul>\n\n<\/div><!-- \/module accordion -->        <\/div>\n                    <\/div>\n                <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-anchor=\"services\" data-lazy=\"1\" class=\"module_row themify_builder_row tb_has_section tb_section-services tb_delm36 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_rblf58 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_juty58  repeat \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>D\u00e9couvrez nos services en:<\/h2>    <\/div>\n<\/div>\n<!-- \/module text -->        <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w gutter-none col_align_top tb_col_count_2 tb_ggg258\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_u43z58 first\">\n                    <!-- module feature -->\n<div  class=\"module module-feature tb_0gxd58 with-chart layout-icon-left size-small \" data-layout-mobile=\"icon-top\" data-layout-desktop=\"icon-left\" data-lazy=\"1\">\n        <div class=\"module-feature-image tf_textc tf_rel\">\n                            <a href=\"\/fr\/services\/evaluation-risques-cybersecurite\/\" aria-label=\"\u00c9VALUATION DE RISQUES DE CYBERS\u00c9CURIT\u00c9\">\n                        <span class=\"module-feature-chart-html5 tf_box tf_rel tf_inline_b\">\n                                    <svg class=\"tf_abs tf_w tf_h\">\n                    <circle class=\"tb_feature_fill\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke-width=\"2\"\/>\n                    <circle class=\"tb_feature_stroke\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke=\"#20232e\" stroke-width=\"2\" data-progress=\"100\" stroke-dasharray=\"0,10000\"\/>\n                                        <\/svg>\n                                <span class=\"chart-html5-circle tf_w tf_h\">\n                    <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/PENTEST.png\" width=\"100\" height=\"100\" style=\"width:calc(100% - 4px);height:calc(100% - 4px)\" alt=\"\u00c9VALUATION DE RISQUES DE CYBERS\u00c9CURIT\u00c9\">                                    <\/span>\n\n                \n            <\/span>\n                        <\/a>\n            <\/div>\n    <div class=\"module-feature-content tf_textc\">\n                    <h3 class=\"module-feature-title\">\n                            <a href=\"\/fr\/services\/evaluation-risques-cybersecurite\/\" aria-label=\"\u00c9VALUATION DE RISQUES DE CYBERS\u00c9CURIT\u00c9\">\u00c9VALUATION DE RISQUES DE CYBERS\u00c9CURIT\u00c9<\/a>\n                        <\/h3>\n                    <div class=\"tb_text_wrap\">\n            <p>Quels sont les actifs les plus pr\u00e9cieux de votre entreprise? Et si vos donn\u00e9es \u00e9taient d\u00e9j\u00e0 \u00e0 haut risque et que vous les perdiez? Quel serait l\u2019impact sur vos affaires, vos clients, vos revenus? Votre organisation peut-elle se permettre d\u2019\u00eatre en panne, ne serait-ce qu\u2019une seule journ\u00e9e, \u00e0 cause d\u2019un incident de cybers\u00e9curit\u00e9? Encore plus inqui\u00e9tant: et si vos donn\u00e9es essentielles \u00e9taient d\u00e9j\u00e0 compromises sans que vous le sachiez.<\/p>        <\/div>\n    <\/div>\n<\/div>\n<!-- \/module feature -->\n        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_rsgk59 last\">\n                    <!-- module feature -->\n<div  class=\"module module-feature tb_hq4f59 with-chart layout-icon-left size-small \" data-layout-mobile=\"icon-top\" data-layout-desktop=\"icon-left\" data-lazy=\"1\">\n        <div class=\"module-feature-image tf_textc tf_rel\">\n                            <a href=\"\/fr\/services\/tests-intrusion\/\" aria-label=\"TESTS D\u2019INTRUSION\">\n                        <span class=\"module-feature-chart-html5 tf_box tf_rel tf_inline_b\">\n                                    <svg class=\"tf_abs tf_w tf_h\">\n                    <circle class=\"tb_feature_fill\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke-width=\"2\"\/>\n                    <circle class=\"tb_feature_stroke\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke=\"#20232e\" stroke-width=\"2\" data-progress=\"100\" stroke-dasharray=\"0,10000\"\/>\n                                        <\/svg>\n                                <span class=\"chart-html5-circle tf_w tf_h\">\n                    <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/APP.png\" width=\"100\" height=\"100\" style=\"width:calc(100% - 4px);height:calc(100% - 4px)\" alt=\"TESTS D\u2019INTRUSION\">                                    <\/span>\n\n                \n            <\/span>\n                        <\/a>\n            <\/div>\n    <div class=\"module-feature-content tf_textc\">\n                    <h3 class=\"module-feature-title\">\n                            <a href=\"\/fr\/services\/tests-intrusion\/\" aria-label=\"TESTS D\u2019INTRUSION\">TESTS D\u2019INTRUSION<\/a>\n                        <\/h3>\n                    <div class=\"tb_text_wrap\">\n            <p>Les services d\u2019\u00e9valuation d\u2019Orenda Security simulent des tentatives r\u00e9elles d\u2019intrusion dans vos r\u00e9seaux, applications et environnements infonuagiques.<\/p>        <\/div>\n    <\/div>\n<\/div>\n<!-- \/module feature -->\n        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w gutter-none col_align_top tb_col_count_2 tb_wzkq59\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_wi8m59 first\">\n                    <!-- module feature -->\n<div  class=\"module module-feature tb_219t59 with-chart layout-icon-left size-small \" data-layout-mobile=\"icon-top\" data-layout-desktop=\"icon-left\" data-lazy=\"1\">\n        <div class=\"module-feature-image tf_textc tf_rel\">\n                            <a href=\"\/fr\/services\/tests-dynamiques\/\" aria-label=\"TESTS DYNAMIQUES (DAST)\">\n                        <span class=\"module-feature-chart-html5 tf_box tf_rel tf_inline_b\">\n                                    <svg class=\"tf_abs tf_w tf_h\">\n                    <circle class=\"tb_feature_fill\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke-width=\"2\"\/>\n                    <circle class=\"tb_feature_stroke\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke=\"#20232e\" stroke-width=\"2\" data-progress=\"100\" stroke-dasharray=\"0,10000\"\/>\n                                        <\/svg>\n                                <span class=\"chart-html5-circle tf_w tf_h\">\n                    <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/DAST.png\" width=\"100\" height=\"100\" style=\"width:calc(100% - 4px);height:calc(100% - 4px)\" alt=\"TESTS DYNAMIQUES (DAST)\">                                    <\/span>\n\n                \n            <\/span>\n                        <\/a>\n            <\/div>\n    <div class=\"module-feature-content tf_textc\">\n                    <h3 class=\"module-feature-title\">\n                            <a href=\"\/fr\/services\/tests-dynamiques\/\" aria-label=\"TESTS DYNAMIQUES (DAST)\">TESTS DYNAMIQUES (DAST)<\/a>\n                        <\/h3>\n                    <div class=\"tb_text_wrap\">\n            <p>Travaillez en partenariat avec Orenda Security pour vos tests dynamiques continus de s\u00e9curit\u00e9 des applications (DAST) et vous aurez acc\u00e8s \u00e0 des professionnels de la s\u00e9curit\u00e9 qui vous guideront pour s\u00e9curiser vos applications. Donnez des outils \u00e0 votre \u00e9quipe de d\u00e9veloppement et maintenez la rapidit\u00e9 de livraison de vos applications.<\/p>        <\/div>\n    <\/div>\n<\/div>\n<!-- \/module feature -->\n        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_jy0q60 last\">\n                    <!-- module feature -->\n<div  class=\"module module-feature tb_n69260 with-chart layout-icon-left size-small \" data-layout-mobile=\"icon-top\" data-layout-desktop=\"icon-left\" data-lazy=\"1\">\n        <div class=\"module-feature-image tf_textc tf_rel\">\n                            <a href=\"\/fr\/services\/tests-statiques-securite-applications\" aria-label=\"TESTS STATIQUES DE S\u00c9CURIT\u00c9 DES APPLICATIONS (SAST)\">\n                        <span class=\"module-feature-chart-html5 tf_box tf_rel tf_inline_b\">\n                                    <svg class=\"tf_abs tf_w tf_h\">\n                    <circle class=\"tb_feature_fill\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke-width=\"2\"\/>\n                    <circle class=\"tb_feature_stroke\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke=\"#20232e\" stroke-width=\"2\" data-progress=\"100\" stroke-dasharray=\"0,10000\"\/>\n                                        <\/svg>\n                                <span class=\"chart-html5-circle tf_w tf_h\">\n                    <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/APPTEST.png\" width=\"100\" height=\"100\" style=\"width:calc(100% - 4px);height:calc(100% - 4px)\" alt=\"TESTS STATIQUES DE S\u00c9CURIT\u00c9 DES APPLICATIONS (SAST)\">                                    <\/span>\n\n                \n            <\/span>\n                        <\/a>\n            <\/div>\n    <div class=\"module-feature-content tf_textc\">\n                    <h3 class=\"module-feature-title\">\n                            <a href=\"\/fr\/services\/tests-statiques-securite-applications\" aria-label=\"TESTS STATIQUES DE S\u00c9CURIT\u00c9 DES APPLICATIONS (SAST)\">TESTS STATIQUES DE S\u00c9CURIT\u00c9 DES APPLICATIONS (SAST)<\/a>\n                        <\/h3>\n                    <div class=\"tb_text_wrap\">\n            <p>Travaillez en partenariat avec Orenda Security pour vos besoins de tests statiques de s\u00e9curit\u00e9 des applications (SAST). Que vous ayez besoin de tests SAST maintenant ou que vous ayez un outil en t\u00eate et une vision sur comment vous aimeriez l\u2019implanter, ou si vous avez besoin d\u2019aide pour d\u00e9marrer, laissez nos professionnels en s\u00e9curit\u00e9 des applications vous aidez \u00e0 instaurer votre s\u00e9curit\u00e9.<\/p>        <\/div>\n    <\/div>\n<\/div>\n<!-- \/module feature -->\n        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w gutter-none col_align_top tb_col_count_2 tb_tslf60\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_nh3860 first\">\n                    <!-- module feature -->\n<div  class=\"module module-feature tb_39ts60 with-chart layout-icon-left size-small \" data-layout-mobile=\"icon-top\" data-layout-desktop=\"icon-left\" data-lazy=\"1\">\n        <div class=\"module-feature-image tf_textc tf_rel\">\n                            <a href=\"\/fr\/services\/modelisation-menaces\/\" aria-label=\"MOD\u00c9LISATION DE MENACES\">\n                        <span class=\"module-feature-chart-html5 tf_box tf_rel tf_inline_b\">\n                                    <svg class=\"tf_abs tf_w tf_h\">\n                    <circle class=\"tb_feature_fill\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke-width=\"2\"\/>\n                    <circle class=\"tb_feature_stroke\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke=\"#20232e\" stroke-width=\"2\" data-progress=\"100\" stroke-dasharray=\"0,10000\"\/>\n                                        <\/svg>\n                                <span class=\"chart-html5-circle tf_w tf_h\">\n                    <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/VULNERABILITY.png\" width=\"100\" height=\"100\" style=\"width:calc(100% - 4px);height:calc(100% - 4px)\" alt=\"MOD\u00c9LISATION DE MENACES\">                                    <\/span>\n\n                \n            <\/span>\n                        <\/a>\n            <\/div>\n    <div class=\"module-feature-content tf_textc\">\n                    <h3 class=\"module-feature-title\">\n                            <a href=\"\/fr\/services\/modelisation-menaces\/\" aria-label=\"MOD\u00c9LISATION DE MENACES\">MOD\u00c9LISATION DE MENACES<\/a>\n                        <\/h3>\n                    <div class=\"tb_text_wrap\">\n            <p>Travaillez en partenariat avec Orenda Security pour d\u00e9buter avec la mod\u00e9lisation de menaces. La mod\u00e9lisation de menaces peut sembler un concept abstrait aujourd\u2019hui mais nos professionnels ont une exp\u00e9rience \u00e9prouv\u00e9e dans le d\u00e9veloppement de ces habilet\u00e9s dans plusieurs environnements, industries et mod\u00e8les de livraison. Nos professionnels en mod\u00e9lisation de menaces accompagnent votre \u00e9quipe dans chaque \u00e9tape d\u2019apprentissage et de pratique pour rencontrer vos processus et mod\u00e8les de livraison.<\/p>        <\/div>\n    <\/div>\n<\/div>\n<!-- \/module feature -->\n        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_lqzu61 last\">\n                    <!-- module feature -->\n<div  class=\"module module-feature tb_5l6661 with-chart layout-icon-left size-small \" data-layout-mobile=\"icon-top\" data-layout-desktop=\"icon-left\" data-lazy=\"1\">\n        <div class=\"module-feature-image tf_textc tf_rel\">\n                            <a href=\"\/fr\/services\/evaluation-vulnerabilite\/\" aria-label=\"\u00c9VALUATION DE LA VULN\u00c9RABILIT\u00c9\">\n                        <span class=\"module-feature-chart-html5 tf_box tf_rel tf_inline_b\">\n                                    <svg class=\"tf_abs tf_w tf_h\">\n                    <circle class=\"tb_feature_fill\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke-width=\"2\"\/>\n                    <circle class=\"tb_feature_stroke\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke=\"#20232e\" stroke-width=\"2\" data-progress=\"100\" stroke-dasharray=\"0,10000\"\/>\n                                        <\/svg>\n                                <span class=\"chart-html5-circle tf_w tf_h\">\n                    <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/VULNERABILITY.png\" width=\"100\" height=\"100\" style=\"width:calc(100% - 4px);height:calc(100% - 4px)\" alt=\"\u00c9VALUATION DE LA VULN\u00c9RABILIT\u00c9\">                                    <\/span>\n\n                \n            <\/span>\n                        <\/a>\n            <\/div>\n    <div class=\"module-feature-content tf_textc\">\n                    <h3 class=\"module-feature-title\">\n                            <a href=\"\/fr\/services\/evaluation-vulnerabilite\/\" aria-label=\"\u00c9VALUATION DE LA VULN\u00c9RABILIT\u00c9\">\u00c9VALUATION DE LA VULN\u00c9RABILIT\u00c9<\/a>\n                        <\/h3>\n                    <div class=\"tb_text_wrap\">\n            <p><strong>\u00c9valuation des vuln\u00e9rabilit\u00e9s (VA) et gestion des vuln\u00e9rabilit\u00e9s (VM)<\/strong><br \/>Une \u00e9valuation des vuln\u00e9rabilit\u00e9s offre une repr\u00e9sentation pr\u00e9cise de la posture de s\u00e9curit\u00e9 d\u2019une organisation \u00e0 un moment pr\u00e9cis. Ce n\u2019est cependant pas suffisant. Il doit y avoir un m\u00e9canisme int\u00e9gr\u00e9 aux proc\u00e9dures pour s\u2019assurer que le processus d\u2019\u00e9valuation des vuln\u00e9rabilit\u00e9s se poursuive sur une base continue. C\u2019est la seule fa\u00e7on de minimiser r\u00e9ellement le risque global.<\/p>        <\/div>\n    <\/div>\n<\/div>\n<!-- \/module feature -->\n        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w gutter-none col_align_top tb_col_count_2 tb_gjm861\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_si6g61 first\">\n                    <!-- module feature -->\n<div  class=\"module module-feature tb_rpvk62 with-chart layout-icon-left size-small \" data-layout-mobile=\"icon-top\" data-layout-desktop=\"icon-left\" data-lazy=\"1\">\n        <div class=\"module-feature-image tf_textc tf_rel\">\n                            <a href=\"\/fr\/services\/securite-infonuagique\/\" aria-label=\"S\u00c9CURIT\u00c9 INFONUAGIQUE\">\n                        <span class=\"module-feature-chart-html5 tf_box tf_rel tf_inline_b\">\n                                    <svg class=\"tf_abs tf_w tf_h\">\n                    <circle class=\"tb_feature_fill\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke-width=\"2\"\/>\n                    <circle class=\"tb_feature_stroke\" r=\"calc(50% - 1.00px)\" cx=\"50%\" cy=\"50%\" stroke=\"#20232e\" stroke-width=\"2\" data-progress=\"100\" stroke-dasharray=\"0,10000\"\/>\n                                        <\/svg>\n                                <span class=\"chart-html5-circle tf_w tf_h\">\n                    <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/CLOUD.png\" width=\"100\" height=\"100\" style=\"width:calc(100% - 4px);height:calc(100% - 4px)\" alt=\"S\u00c9CURIT\u00c9 INFONUAGIQUE\">                                    <\/span>\n\n                \n            <\/span>\n                        <\/a>\n            <\/div>\n    <div class=\"module-feature-content tf_textc\">\n                    <h3 class=\"module-feature-title\">\n                            <a href=\"\/fr\/services\/securite-infonuagique\/\" aria-label=\"S\u00c9CURIT\u00c9 INFONUAGIQUE\">S\u00c9CURIT\u00c9 INFONUAGIQUE<\/a>\n                        <\/h3>\n                    <div class=\"tb_text_wrap\">\n            <p>Les services d\u2019\u00e9valuation de Orenda Security simulent des tentatives r\u00e9elles d\u2019intrusion dans vos r\u00e9seaux, applications et environnements infonuagiques.<\/p>        <\/div>\n    <\/div>\n<\/div>\n<!-- \/module feature -->\n        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_0xuz62 last\">\n                            <\/div>\n                    <\/div>\n                <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_f63n36 tf_w\">\n                        <div class=\"row_inner gutter-none direction_rtl col_align_bottom tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_xhfo65 first\">\n                    <!-- module template_part -->\n<div  class=\"module module-layout-part tb_op8e65 \">\n    <div class=\"tb_layout_part_wrap tf_w\"><!--themify_builder_content-->\n    <div  class=\"themify_builder_content themify_builder_content-738 themify_builder not_editable_builder in_the_loop\" data-postid=\"738\">\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_svel459 tf_w\">\n                        <div class=\"row_inner col_align_bottom gutter-none tb_col_count_2 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col4-2 tb_bpxj465 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_gis7465 image-top   auto_fullwidth tf_mw\" data-lazy=\"1\" data-parallax-element-speed=\"2\" data-lax-translate-y=\"vh 1,0 -140\" data-lax=\"true\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/touch.jpg\" width=\"500\" height=\"430\" title=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\" alt=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col4-2 tb_kma3460 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_dth6463   \" data-lazy=\"1\" data-parallax-element-speed=\"1\" data-lax-translate-y=\"vh 1,0 -70\" data-lax=\"true\">\n        <div  class=\"tb_text_wrap\">\n        <h2>CONTACTEZ-NOUS!<\/h2><p>Contactez-nous pour en apprendre davantage sur les renseignements en s\u00e9curit\u00e9.<\/p>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module buttons -->\n<div  class=\"module module-buttons tb_3lk6368 buttons-horizontal outline   circle\" data-lazy=\"1\" data-lax-translate-y=\"(vh*1) 0,(vh*0) -70\" data-lax=\"true\">\n        <div class=\"module-buttons-item tf_in_flx\">\n                        <a href=\"\/fr\/contact\/\" class=\"ui builder_button tf_in_flx tb_default_color\" >\n                                                CONTACTEZ-NOUS                                        <\/a>\n                <\/div>\n            <\/div>\n<!-- \/module buttons -->\n        <\/div>\n                        <\/div>\n        <\/div>\n            <\/div>\n<!--\/themify_builder_content--><\/div>\n<\/div>\n<!-- \/module template_part -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-css_id=\"74pr36\" data-lazy=\"1\" class=\"module_row themify_builder_row fullwidth tb_74pr36 tf_w\">\n            <span  class=\"builder_row_cover tf_abs\" data-lazy=\"1\"><\/span>            <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_5g4666 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_b5qb66  repeat \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>T\u00e9moignages<\/h2>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module image -->\n<div  class=\"module module-image tb_rg6w66 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/themify.me\/demo\/themes\/predesigned-rows\/files\/2018\/06\/testimonial-stars.png\" width=\"95\" height=\"15\" title=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\" alt=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image --><!-- module template_part -->\n<div  class=\"module module-layout-part tb_0hrz910 \">\n    <div class=\"tb_layout_part_wrap tf_w\"><!--themify_builder_content-->\n    <div  class=\"themify_builder_content themify_builder_content-1243 themify_builder not_editable_builder in_the_loop\" data-postid=\"1243\">\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_0gxs530 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_uk2j050 first\">\n                    <div  class=\"module themify_builder_slider_wrap tf_clearfix module-testimonial-slider tb_gji9600 testimonials image-bottom themify_builder_slider_vertical  wow\" data-tf-animation=\"fadeInUp\" data-lazy=\"1\">\n        <div class=\"themify_builder_slider tf_carousel tf_swiper-container tf_rel tf_overflow\" data-lazy=\"1\"        data-visible=\"1\"\n        data-tab-visible=\"1\"\n        data-mob-visible=\"1\"\n        data-scroll=\"1\"\n                    data-nav_out=\"1\"\n                            data-auto=\"3000\"\n            data-controller=\"0\"\n            data-pause_hover=\"1\"\n                data-speed=\"normal\"\n        data-wrapvar=\"1\"\n        data-slider_nav=\"1\"\n        data-pager=\"1\"\n        data-effect=\"fade\" \n        data-height=\"auto\"\n        data-css_url=\"https:\/\/orendasecurity.com\/wp-content\/themes\/themify-ultra\/themify\/themify-builder\/css\/modules\/sliders\/carousel,https:\/\/orendasecurity.com\/wp-content\/themes\/themify-ultra\/themify\/themify-builder\/css\/modules\/sliders\/testimonial-slider\"\n                    >\n        <div class=\"tf_swiper-wrapper tf_lazy tf_rel tf_w tf_h tf_textc\">\n                <div class=\"post tf_swiper-slide\">            <div class=\"testimonial-item\" style=\"margin-left:50px;margin-right:50px;\">\n                                <div class=\"testimonial-content\">\n                                            <h3 class=\"testimonial-title\">Expertise technique et \u00e9valuations de grande qualit\u00e9<\/h3>\n                                                                                    <div class=\"testimonial-entry-content\">\n                            <p>Orenda se sont av\u00e9r\u00e9s un partenaire fiable pour AMA et nous ont aid\u00e9 \u00e0 d\u00e9velopper et livrer des applications s\u00e9curis\u00e9es \u00e0 tous nos membres AMA. Je recommande Orenda Security aux autres clubs AAA et CAA sur la base d\u2019une solide relation de travail avec AMA, pour leur expertise technique et leur excellente r\u00e9putation dans la livraison d\u2019\u00e9valuations de grande qualit\u00e9.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-340\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/AMA-300x72.png\" alt=\"\" width=\"150\" height=\"36\" srcset=\"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/AMA-300x72.png 300w, https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/AMA-768x185.png 768w, https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/AMA-1024x247.png 1024w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>                        <\/div>\n                                        \n                                            <div class=\"testimonial-author\">\n                                                            <div class=\"person-name\">Collin Moody<\/div>\n                                                                                        <span class=\"person-position\">Directeur principal de l\u2019information (CIO)<\/span>\n                                                                                        <div class=\"person-company\">\n                                                                            Alberta Motor Association                                                                    <\/div>\n                                                    <\/div>\n                                    <\/div>\n            <\/div>\n        <\/div><!-- .post -->            <div class=\"post tf_swiper-slide\" style=\"content-visibility:hidden\">            <div class=\"testimonial-item\" style=\"margin-left:50px;margin-right:50px;\">\n                                <div class=\"testimonial-content\">\n                                            <h3 class=\"testimonial-title\">Services de tests d\u2019intrusion de s\u00e9curit\u00e9 solides et fiables<\/h3>\n                                                                                    <div class=\"testimonial-entry-content\">\n                            <p>Il est difficile de trouver un partenaire fiable poss\u00e9dant une grande expertise technique! Orenda Security \u00e9taient exactement ce que nous recherchions. Ils nous ont aid\u00e9 \u00e0 am\u00e9liorer la posture de s\u00e9curit\u00e9 de notre produit et de notre application. Nous recommandons Orenda Security \u00e0 tout leader en s\u00e9curit\u00e9 qui recherche des services de tests d\u2019intrusion de s\u00e9curit\u00e9 solides et fiables.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-348\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/07\/concert-cloud-150x150.png\" alt=\"\" width=\"128\" height=\"40\" srcset=\"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/concert-cloud-300x94.png 300w, https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/concert-cloud-768x240.png 768w, https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/concert-cloud.png 945w\" sizes=\"auto, (max-width: 128px) 100vw, 128px\" \/><\/p>                        <\/div>\n                                        \n                                            <div class=\"testimonial-author\">\n                                                                                                                    <div class=\"person-company\">\n                                                                            Concert Cloud Inc.                                                                    <\/div>\n                                                    <\/div>\n                                    <\/div>\n            <\/div>\n        <\/div><!-- .post -->            <div class=\"post tf_swiper-slide\" style=\"content-visibility:hidden\">            <div class=\"testimonial-item\" style=\"margin-left:50px;margin-right:50px;\">\n                                <div class=\"testimonial-content\">\n                                            <h3 class=\"testimonial-title\">Haut niveau d\u2019expertise dans la r\u00e9alisation de tests d\u2019intrusion d\u2019applications<\/h3>\n                                                                                    <div class=\"testimonial-entry-content\">\n                            <p>Orenda Security ont d\u00e9montr\u00e9 un haut niveau d\u2019expertise dans la r\u00e9alisation de tests d\u2019intrusion d\u2019applications. Leurs observations et recommandations \u00e9taient claires et r\u00e9alisables. Nous recommandons fortement Orenda Security \u00e0 toute entreprise qui recherche des services d\u2019\u00e9valuation de la s\u00e9curit\u00e9.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-652 aligncenter\" src=\"http:\/\/47d.7bd.myftpupload.com\/wp-content\/uploads\/2019\/08\/revolution-capital.png\" alt=\"\" width=\"90\" height=\"90\"><\/p>                        <\/div>\n                                        \n                                            <div class=\"testimonial-author\">\n                                                            <div class=\"person-name\">Colton Toscher<\/div>\n                                                                                        <span class=\"person-position\">Directeur principal de la technologie (CTO)<\/span>\n                                                                                        <div class=\"person-company\">\n                                                                            Revolution Capital                                                                     <\/div>\n                                                    <\/div>\n                                    <\/div>\n            <\/div>\n        <\/div><!-- .post -->                <\/div>\n    <\/div>\n<\/div>\n        <\/div>\n                        <\/div>\n        <\/div>\n            <\/div>\n<!--\/themify_builder_content--><\/div>\n<\/div>\n<!-- \/module template_part -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-css_id=\"d5fn36\" data-lazy=\"1\" class=\"module_row themify_builder_row fullwidth tb_d5fn36 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_qtgc67 first\">\n                    <!-- module template_part -->\n<div  class=\"module module-layout-part tb_2p9a67 \">\n    <div class=\"tb_layout_part_wrap tf_w\"><!--themify_builder_content-->\n    <div  class=\"themify_builder_content themify_builder_content-745 themify_builder not_editable_builder in_the_loop\" data-postid=\"745\">\n                        <div  data-parallax-bg=\"desktop\" data-css_id=\"b5cn527\" data-lazy=\"1\" class=\"module_row themify_builder_row fullwidth_row_container tb_b5cn527 tf_w\">\n            <span  class=\"builder_row_cover tf_abs\" data-lazy=\"1\"><\/span>            <div class=\"row_inner col_align_middle tb_col_count_2 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col3-2 tb_th1l528 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_fvj3529   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>L\u2019HISTOIRE ET L\u2019\u00c9QUIPE <br>DERRI\u00c8RE ORENDA SECURITY <sup>\u00ae<\/sup><\/h2>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module text -->\n<div  class=\"module module-text tb_94nx530   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Orenda Security <sup>\u00ae<\/sup> est une firme de s\u00e9curit\u00e9 informatique d\u2019\u00e9lite fond\u00e9e sur un esprit d\u2019int\u00e9grit\u00e9 et de partenariat avec notre \u00e9quipe et, surtout, nos clients.<\/p>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module buttons -->\n<div  class=\"module module-buttons tb_ae10530 buttons-horizontal outline   circle\" data-lazy=\"1\">\n        <div class=\"module-buttons-item tf_in_flx\">\n                        <a href=\"\/fr\/a-propos\/\" class=\"ui builder_button tf_in_flx tb_default_color\" >\n                                                \u00c0 PROPOS                                        <\/a>\n                <\/div>\n            <\/div>\n<!-- \/module buttons -->\n        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col3-1 tb_h2di530 last\">\n                            <\/div>\n                        <\/div>\n        <\/div>\n            <\/div>\n<!--\/themify_builder_content--><\/div>\n<\/div>\n<!-- \/module template_part -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications Les services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications de Orenda Security sont personnalis\u00e9s pour vous aider \u00e0 s\u00e9curiser les applications essentielles \u00e0 vos affaires et assurer leur conformit\u00e9 avec les exigences de s\u00e9curit\u00e9 de votre industrie. DEMANDER UN DEVIS EN SAVOIR PLUS La s\u00e9curisation des applications repr\u00e9sente un [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":947,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-879","page","type-page","status-publish","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications - Orenda Security<\/title>\n<meta name=\"description\" content=\"Les services d&#039;\u00e9valuation d&#039;applications Orenda Security sont personnalis\u00e9s pour vous aider \u00e0 s\u00e9curiser vos applications strat\u00e9giques et \u00e0 vous conformer aux exigences de s\u00e9curit\u00e9 de votre secteur.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/orendasecurity.com\/fr\/services\/evaluation-applications\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications - Orenda Security\" \/>\n<meta property=\"og:description\" content=\"Les services d&#039;\u00e9valuation d&#039;applications Orenda Security sont personnalis\u00e9s pour vous aider \u00e0 s\u00e9curiser vos applications strat\u00e9giques et \u00e0 vous conformer aux exigences de s\u00e9curit\u00e9 de votre secteur.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/orendasecurity.com\/fr\/services\/evaluation-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"Orenda Security\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-05T01:01:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/PENTEST.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/evaluation-applications\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/evaluation-applications\\\/\",\"name\":\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications - Orenda Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/evaluation-applications\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/evaluation-applications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/PENTEST.png\",\"datePublished\":\"2019-10-27T19:06:37+00:00\",\"dateModified\":\"2019-12-05T01:01:07+00:00\",\"description\":\"Les services d'\u00e9valuation d'applications Orenda Security sont personnalis\u00e9s pour vous aider \u00e0 s\u00e9curiser vos applications strat\u00e9giques et \u00e0 vous conformer aux exigences de s\u00e9curit\u00e9 de votre secteur.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/evaluation-applications\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/evaluation-applications\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/evaluation-applications\\\/#primaryimage\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/PENTEST.png\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/PENTEST.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/evaluation-applications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"name\":\"Orenda Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/orendasecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\",\"name\":\"Orenda Security\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"width\":432,\"height\":173,\"caption\":\"Orenda Security\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications - Orenda Security","description":"Les services d'\u00e9valuation d'applications Orenda Security sont personnalis\u00e9s pour vous aider \u00e0 s\u00e9curiser vos applications strat\u00e9giques et \u00e0 vous conformer aux exigences de s\u00e9curit\u00e9 de votre secteur.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/orendasecurity.com\/fr\/services\/evaluation-applications\/","og_locale":"fr_FR","og_type":"article","og_title":"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications - Orenda Security","og_description":"Les services d'\u00e9valuation d'applications Orenda Security sont personnalis\u00e9s pour vous aider \u00e0 s\u00e9curiser vos applications strat\u00e9giques et \u00e0 vous conformer aux exigences de s\u00e9curit\u00e9 de votre secteur.","og_url":"https:\/\/orendasecurity.com\/fr\/services\/evaluation-applications\/","og_site_name":"Orenda Security","article_modified_time":"2019-12-05T01:01:07+00:00","og_image":[{"url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/PENTEST.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/orendasecurity.com\/fr\/services\/evaluation-applications\/","url":"https:\/\/orendasecurity.com\/fr\/services\/evaluation-applications\/","name":"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications - Orenda Security","isPartOf":{"@id":"https:\/\/orendasecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/orendasecurity.com\/fr\/services\/evaluation-applications\/#primaryimage"},"image":{"@id":"https:\/\/orendasecurity.com\/fr\/services\/evaluation-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/PENTEST.png","datePublished":"2019-10-27T19:06:37+00:00","dateModified":"2019-12-05T01:01:07+00:00","description":"Les services d'\u00e9valuation d'applications Orenda Security sont personnalis\u00e9s pour vous aider \u00e0 s\u00e9curiser vos applications strat\u00e9giques et \u00e0 vous conformer aux exigences de s\u00e9curit\u00e9 de votre secteur.","breadcrumb":{"@id":"https:\/\/orendasecurity.com\/fr\/services\/evaluation-applications\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/orendasecurity.com\/fr\/services\/evaluation-applications\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/fr\/services\/evaluation-applications\/#primaryimage","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/PENTEST.png","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/PENTEST.png"},{"@type":"BreadcrumbList","@id":"https:\/\/orendasecurity.com\/fr\/services\/evaluation-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/orendasecurity.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/orendasecurity.com\/fr\/services\/"},{"@type":"ListItem","position":3,"name":"Services d\u2019\u00e9valuation de la s\u00e9curit\u00e9 des applications"}]},{"@type":"WebSite","@id":"https:\/\/orendasecurity.com\/#website","url":"https:\/\/orendasecurity.com\/","name":"Orenda Security","description":"","publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/orendasecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/orendasecurity.com\/#organization","name":"Orenda Security","url":"https:\/\/orendasecurity.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","width":432,"height":173,"caption":"Orenda Security"},"image":{"@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/pages\/879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/comments?post=879"}],"version-history":[{"count":0,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/pages\/879\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/pages\/947"}],"wp:attachment":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/media?parent=879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}