Electronic data must be protected according to these 4 principles :


We cover a wide range of IT security technologies, such as :


 Perimeter security : firewalls, IPSEC VPN gateways

 Endpoint protection

 Intusion Prevention Systems (IPS)

 Antispam solutions (using DKIM, SPF, etc.)

 Virtualization and hyperconvergence

 Security Information and Event Management (SIEM)

 Access control to personal devices (BYOD)

 Wireless access management

 System and application load balancing

 IP address management (IPAM) and IPv6 migration

 WAN optimization

 Management and protection of DNS services (DNSSEC)

Security audit, risk assessment and management

 Web and Wifi pentest in black box, gray box or white box