{"id":7650,"date":"2024-06-03T10:51:34","date_gmt":"2024-06-03T08:51:34","guid":{"rendered":"https:\/\/ipsip.eu\/?p=7650"},"modified":"2025-06-27T16:14:33","modified_gmt":"2025-06-27T14:14:33","slug":"externalisation-soc","status":"publish","type":"post","link":"https:\/\/ipsip.eu\/fr\/externalisation-soc\/","title":{"rendered":"Externalisation d&rsquo;un SOC"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7650\" class=\"elementor elementor-7650\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-192d30 elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"192d30\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;opacity-tilt&quot;,&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 2600 131.1\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M0 0L2600 0 2600 69.1 0 0z\"\/>\n\t<path class=\"elementor-shape-fill\" style=\"opacity:0.5\" d=\"M0 0L2600 0 2600 69.1 0 69.1z\"\/>\n\t<path class=\"elementor-shape-fill\" style=\"opacity:0.25\" d=\"M2600 0L0 0 0 130.1 2600 69.1z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-14bc73ff\" data-id=\"14bc73ff\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-14f211d elementor-widget elementor-widget-spacer\" data-id=\"14f211d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce9f6a5 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"ce9f6a5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Ils ont externalis\u00e9 leur SOC 24\/7 pour renforcer leur cybers\u00e9curit\u00e9<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f56c14 elementor-align-center elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"9f56c14\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/research.typeform.com\/to\/LIPTrQcE\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contactez-nous<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-56770d1 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"56770d1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1742319\" data-id=\"1742319\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4c0cbf4 elementor-widget elementor-widget-heading\" data-id=\"4c0cbf4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">USE CASE<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ccefa4 elementor-widget elementor-widget-text-editor\" data-id=\"0ccefa4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>IPSIP &#8211; Juin 2024<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5897254 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"5897254\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-383e842\" data-id=\"383e842\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43b8638 elementor-widget elementor-widget-spacer\" data-id=\"43b8638\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42d7ba6 elementor-widget elementor-widget-heading\" data-id=\"42d7ba6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Quel est le contexte client ? <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d2df14 elementor-widget elementor-widget-text-editor\" data-id=\"2d2df14\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L\u2019\u00e9tude de cas porte sur un int\u00e9grateur reconnu dans le domaine de la cybers\u00e9curit\u00e9 (MSSP), proposant une gamme compl\u00e8te de services pour r\u00e9pondre aux besoins des organisations de toutes tailles. En termes simples, cela signifie qu&rsquo;ils aident les entreprises et les organisations \u00e0 prot\u00e9ger leurs actifs informatiques et \u00e0 se conformer aux r\u00e9glementations en vigueur.<\/p><p>N\u00e9anmoins, notre client manquait de ressources humaines et de budget pour constituer une \u00e9quipe d&rsquo;analystes en astreinte la nuit et les week-ends. Ce manque d&rsquo;\u00e9quipe d&rsquo;astreinte entra\u00eenait des difficult\u00e9s pour le client \u00e0 assurer la surveillance de ses syst\u00e8mes informatiques et \u00e0 r\u00e9pondre aux incidents en temps opportun.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-568c477 elementor-widget elementor-widget-heading\" data-id=\"568c477\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Quel est l'objectif fix\u00e9 par IPSIP ? <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4e10f3 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"b4e10f3\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Identifier la source de la menace et isoler les syst\u00e8mes affect\u00e9s dans les plus brefs d\u00e9lais.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Respecter le SLA (Service Level Agreement), le contrat de service \u00e9tabli entre le prestataire informatique, ici IPSIP et son client.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e49ad1 elementor-widget elementor-widget-heading\" data-id=\"2e49ad1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Le champ d'action de l'\u00e9tude de cas : <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cdf9e6 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"6cdf9e6\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Une supervision continue (24\/7) des \u00e9v\u00e8nements suspects et investigations syst\u00e9matiques<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">La qualification des menaces, alerting intelligent et r\u00e9solution des incidents<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Une communication directe et transparente \u00e9tablie entre nos analystes cybers\u00e9curit\u00e9 et ceux du client.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Des rapports d'investigation<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">L\u2019envoi d\u2019un rapport journalier des alertes trait\u00e9es<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9155e3 elementor-widget elementor-widget-spacer\" data-id=\"f9155e3\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28eb87e elementor-widget elementor-widget-heading\" data-id=\"28eb87e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Les chiffres cl\u00e9s : <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fda5e37 elementor-widget elementor-widget-text-editor\" data-id=\"fda5e37\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>+ de 96 000 endpoint supervis\u00e9s<\/p><p>+ de 130 000 alertes depuis le d\u00e9but d&rsquo;ann\u00e9e 2024<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4d907b2 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"4d907b2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2635c77\" data-id=\"2635c77\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6539bfd elementor-widget elementor-widget-spacer\" data-id=\"6539bfd\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f59cf6 elementor-widget elementor-widget-heading\" data-id=\"3f59cf6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Rappel du SOC<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-229b05f elementor-widget elementor-widget-text-editor\" data-id=\"229b05f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Le SOC est un dispositif de supervision et d\u2019administration de la s\u00e9curit\u00e9 du syst\u00e8me d\u2019information permettant, gr\u00e2ce \u00e0 la collecte d\u2019\u00e9v\u00e9nements, de d\u00e9tecter des incidents de s\u00e9curit\u00e9 informatique, de les analyser et de d\u00e9finir les r\u00e9ponses en cas d\u2019\u00e9mission d\u2019alerte.<\/span><\/p><p><span style=\"font-weight: 400;\">Son objectif final est d\u2019assurer une surveillance 24h\/24 et 7j\/7 afin de r\u00e9tablir dans un d\u00e9lai le plus court possible la s\u00e9curit\u00e9 du syst\u00e8me d\u2019information lorsqu\u2019elle est menac\u00e9e.<\/span><\/p><p><span style=\"font-weight: 400;\">Pourtant, encore trop peu d\u2019organisations sont \u00e9quip\u00e9es d\u2019un tel dispositif. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-dcd5e38\" data-id=\"dcd5e38\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9670600 elementor-widget elementor-widget-spacer\" data-id=\"9670600\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c6d5e0 elementor-widget elementor-widget-image\" data-id=\"2c6d5e0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/05\/Computer.webp\" class=\"attachment-large size-large wp-image-7681\" alt=\"SOC 24\/7 IPSIP GROUP\" srcset=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/05\/Computer.webp 500w, https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/05\/Computer-300x300.webp 300w, https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/05\/Computer-150x150.webp 150w, https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/05\/Computer-12x12.webp 12w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3555b81 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"3555b81\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-64ef708\" data-id=\"64ef708\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd7054a elementor-widget elementor-widget-heading\" data-id=\"dd7054a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Le choix judicieux de notre client pour s'\u00e9quiper de ce dispositif.<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d4ba0e elementor-widget elementor-widget-text-editor\" data-id=\"7d4ba0e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Notre client a fait le choix d&rsquo;externaliser son SOC pour les raisons suivantes :\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cf56d05 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"cf56d05\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-6e5a554\" data-id=\"6e5a554\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ac1d6b elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"6ac1d6b\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-money-check-alt\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d5257c elementor-widget elementor-widget-text-editor\" data-id=\"2d5257c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>R\u00e9duction des co\u00fbts\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88de15b elementor-widget elementor-widget-text-editor\" data-id=\"88de15b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L&rsquo;externalisation d&rsquo;un SOC fait \u00e9conomiser de l&rsquo;argent \u00e0 long terme. Le co\u00fbt de construction et de gestion d&rsquo;un SOC interne peut \u00eatre prohibitif pour de nombreuses entreprises.<\/p><p>L&rsquo;externalisation leur a permis de profiter d\u2019\u00e9conomies d&rsquo;\u00e9chelle et d&rsquo;\u00e9viter des co\u00fbts d&rsquo;investissement initiaux importants dans le personnel, la technologie et l&rsquo;infrastructure. Leurs \u00e9quipes internes peuvent alors se concentrer sur des t\u00e2ches \u00e0 valeur ajout\u00e9e pour leurs clients finaux.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-43783a1\" data-id=\"43783a1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-588d2d1 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"588d2d1\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-bullhorn\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24c407e elementor-widget elementor-widget-text-editor\" data-id=\"24c407e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Surveillance et r\u00e9ponse 24\/7<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ff9adf elementor-widget elementor-widget-text-editor\" data-id=\"9ff9adf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les cybermenaces peuvent survenir \u00e0 tout moment, et il est essentiel d&rsquo;avoir une surveillance et une r\u00e9ponse 24\/7 en place.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-7e3a986\" data-id=\"7e3a986\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d85561c elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"d85561c\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar-check\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98e9847 elementor-widget elementor-widget-text-editor\" data-id=\"98e9847\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Am\u00e9lioration de la conformit\u00e9<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee5b835 elementor-widget elementor-widget-text-editor\" data-id=\"ee5b835\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>De nombreuses r\u00e9glementations et normes de conformit\u00e9 exigent que les entreprises disposent d&rsquo;un SOC efficace. Un SOC externalis\u00e9 les aide \u00e0 respecter ces exigences et \u00e0 r\u00e9duire leur risque de sanctions ou de violations de donn\u00e9es.<\/p><p>Exemples de normes de conformit\u00e9 :\u00a0<\/p><p>ISO 27 001\u00a0<br \/>SOC 2 Type II<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-7b1c4b1\" data-id=\"7b1c4b1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d40b81d elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"d40b81d\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chart-line\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ce9ea4 elementor-widget elementor-widget-text-editor\" data-id=\"8ce9ea4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Scalabilit\u00e9 et flexibilit\u00e9<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81e52bb elementor-widget elementor-widget-text-editor\" data-id=\"81e52bb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Votre entreprise peut \u00e9voluer rapidement, comme cela a pu \u00eatre le cas pour notre client, et de ce fait, il est important que votre infrastructure de s\u00e9curit\u00e9 puisse suivre le rythme.<\/p><p>Un SOC externalis\u00e9 peut \u00e9voluer pour r\u00e9pondre \u00e0 vos besoins changeants, vous garantissant ainsi une protection continue m\u00eame lorsque votre entreprise se d\u00e9veloppe.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8e67914 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"8e67914\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-363b76b\" data-id=\"363b76b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9890970 elementor-widget elementor-widget-heading\" data-id=\"9890970\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">5 \u00e9tapes pour identifier la source de la menace et isoler les syst\u00e8mes affect\u00e9s dans les plus brefs d\u00e9lais :<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27bd028 elementor-widget elementor-widget-spacer\" data-id=\"27bd028\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a410c2 elementor-widget elementor-widget-text-editor\" data-id=\"3a410c2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>1.<\/strong> La premi\u00e8re \u00e9tape consiste \u00e0 identifier la source de la menace. Cela peut impliquer l&rsquo;analyse des journaux syst\u00e8me, des fichiers journaux d&rsquo;applications et d&rsquo;autres donn\u00e9es pour identifier l&rsquo;activit\u00e9 malveillante.<\/p><p><strong>2.<\/strong> Une fois la source de la menace identifi\u00e9e, il est important d&rsquo;isoler les syst\u00e8mes affect\u00e9s pour emp\u00eacher la propagation de la malveillance. Cela peut impliquer de d\u00e9connecter les syst\u00e8mes du r\u00e9seau ou de les placer en quarantaine.<\/p><p><strong>3.<\/strong> Mettre fin \u00e0 l&rsquo;activit\u00e9 malveillante. Une fois les syst\u00e8mes affect\u00e9s isol\u00e9s, il est important de mettre fin \u00e0 l&rsquo;activit\u00e9 malveillante. Cela peut impliquer la suppression de malwares.<br \/>&#8211; Supprimer les malwares <br \/>&#8211; Modifier les mots de passe<br \/>&#8211; Mettre \u00e0 jour les logiciels<\/p><p><strong>4.<\/strong> D\u00e9terminer l&rsquo;\u00e9tendue de la violation.\u00a0<br \/>Une fois la menace contenue, il est important d&rsquo;\u00e9valuer les dommages caus\u00e9s. Cela implique de d\u00e9terminer quelles donn\u00e9es ont \u00e9t\u00e9 compromises et si des syst\u00e8mes ont \u00e9t\u00e9 endommag\u00e9s puis identifier les donn\u00e9es sensibles compromises.<\/p><p><strong>5.<\/strong> Les derni\u00e8res \u00e9tapes sont de pr\u00e9venir de futures attaques.<br \/>Il est important d&rsquo;analyser la cause de l&rsquo;attaque pour identifier les failles de s\u00e9curit\u00e9 qui ont \u00e9t\u00e9 exploit\u00e9es. Cela permettra de mettre en place des mesures pour emp\u00eacher de futures attaques.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5dcbd23 elementor-widget elementor-widget-heading\" data-id=\"5dcbd23\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Les comp\u00e9tences techniques d\u2019IPSIP pour relever le d\u00e9fis :<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9cabf48 elementor-widget-mobile__width-initial wpr-tabs-position-above wpr-tabs-hr-position-justify wpr-tabs-icon-position-left wpr-tabs-triangle-yes wpr-tabs-triangle-type-outer elementor-widget elementor-widget-wpr-tabs\" data-id=\"9cabf48\" data-element_type=\"widget\" data-settings=\"{&quot;tab_transition_duration&quot;:0.1}\" data-widget_type=\"wpr-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\n\t\t<div class=\"wpr-tabs\" data-options=\"{&quot;activeTab&quot;:1,&quot;trigger&quot;:&quot;click&quot;,&quot;autoplay&quot;:&quot;&quot;,&quot;autoplaySpeed&quot;:0}\">\n\t\t\t\n\t\t\t<div class=\"wpr-tabs-wrap\">\n\t\t\t\t\n\t\t\t\t<div id=\"wpr-tab-1641\" class=\"wpr-tab elementor-repeater-item-f218af6\" data-tab=\"1\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-tab-title\">Attaque malware<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div id=\"wpr-tab-1642\" class=\"wpr-tab elementor-repeater-item-d901e16\" data-tab=\"2\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-tab-title\">Proc\u00e9dures g\u00e9n\u00e9rales<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"wpr-tabs-content-wrap\">\n\t\t\t\t\n\t\t\t\t<div id=\"wpr-tab-content-1641\" class=\"wpr-tab-content elementor-repeater-item-f218af6\" data-tab=\"1\">\n\t\t\t\t\t<div class=\"wpr-tab-content-inner elementor-clearfix wpr-anim-size-large wpr-overlay-fade-in\"><ul><li>D\u00e9tecter la pr\u00e9sence du malware en utilisant des outils de s\u00e9curit\u00e9 tels que les antivirus, les anti-malware et les syst\u00e8mes de d\u00e9tection d'intrusion (IDS).<\/li><li>Analyser les fichiers infect\u00e9s pour identifier le type d'attaque.<\/li><li>Isoler les syst\u00e8mes infect\u00e9s pour emp\u00eacher la propagation du malware \u00e0 d'autres parties du r\u00e9seau.<\/li><li>D\u00e9sactiver les comptes utilisateurs compromis et modifier les mots de passe.<\/li><\/ul><\/div>\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<div id=\"wpr-tab-content-1642\" class=\"wpr-tab-content elementor-repeater-item-d901e16\" data-tab=\"2\">\n\t\t\t\t\t<div class=\"wpr-tab-content-inner elementor-clearfix wpr-anim-size-large wpr-overlay-fade-in\"><ul><li>Restaurer les syst\u00e8mes et les donn\u00e9es \u00e0 partir de sauvegardes s\u00e9curis\u00e9es cr\u00e9\u00e9es avant l'attaque.<\/li><li>Documenter l'ensemble du processus de r\u00e9ponse \u00e0 l'incident, y compris les \u00e9tapes entreprises, les outils utilis\u00e9s et les le\u00e7ons apprises.<\/li><li>R\u00e9diger un rapport d'incident d\u00e9taillant les informations techniques sur l'attaque<\/li><\/ul><\/div>\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3c3c5c3 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"3c3c5c3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-10674cc\" data-id=\"10674cc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b75dbb4 elementor-widget elementor-widget-heading\" data-id=\"b75dbb4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">En r\u00e9sum\u00e9, IPSIP c'est...<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8182fd2 elementor-widget elementor-widget-heading\" data-id=\"8182fd2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">...votre s\u00e9curit\u00e9 informatique entre les mains d'experts.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c983cef elementor-widget elementor-widget-spacer\" data-id=\"c983cef\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0d0a0fa elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"0d0a0fa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e4078f5\" data-id=\"e4078f5\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8dafb90 elementor-widget elementor-widget-text-editor\" data-id=\"8dafb90\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Une surveillance infaillible 24\/7.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-706cf26 elementor-widget elementor-widget-text-editor\" data-id=\"706cf26\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Notre \u00e9quipe d\u2019experts qualifi\u00e9s (<strong>SentinelOne, Sekoia, Fortinet, Crowdstrike&#8230;<\/strong>) veille sur votre syst\u00e8me d&rsquo;information en permanence, 365 jours par an. Gr\u00e2ce \u00e0 un syst\u00e8me de roulement, ils assurent une surveillance ininterrompue de votre r\u00e9seau, de vos applications et de vos syst\u00e8mes informatiques.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ab84419\" data-id=\"ab84419\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c0c83b0 elementor-widget elementor-widget-text-editor\" data-id=\"c0c83b0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>R\u00e9activit\u00e9 imm\u00e9diate face aux menaces.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f396fca elementor-widget elementor-widget-text-editor\" data-id=\"f396fca\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">En cas d&rsquo;incident, notre \u00e9quipe est pr\u00eate \u00e0 r\u00e9agir instantan\u00e9ment pour neutraliser la menace et minimiser les dommages.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-064a107 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"064a107\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-780bc54\" data-id=\"780bc54\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3571ef2 elementor-widget elementor-widget-text-editor\" data-id=\"3571ef2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>IPSIP, votre alli\u00e9 de la cybers\u00e9curit\u00e9.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79b30f6 elementor-widget elementor-widget-text-editor\" data-id=\"79b30f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Confiez la s\u00e9curit\u00e9 de votre syst\u00e8me d&rsquo;information \u00e0 des experts et profitez d&rsquo;une tranquillit\u00e9 d&rsquo;esprit absolue. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-25521fe elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"25521fe\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d74f24c\" data-id=\"d74f24c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-843c1f0 elementor-widget elementor-widget-text-editor\" data-id=\"843c1f0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Contactez-nous d\u00e8s aujourd&rsquo;hui pour d\u00e9couvrir comment IPSIP peut devenir votre partenaire de confiance en mati\u00e8re de cybers\u00e9curit\u00e9 \ud83d\ude80<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9862afe elementor-widget elementor-widget-spacer\" data-id=\"9862afe\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-da58381 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"da58381\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-56daf93\" data-id=\"56daf93\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52adfa4 elementor-align-right elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"52adfa4\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/research.typeform.com\/to\/LIPTrQcE\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">\u00catre contact\u00e9 par nos experts<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5526869\" data-id=\"5526869\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-948ad99 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"948ad99\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/ipsip.eu\/soc\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">D\u00e9couvrir les solutions d'IPSIP<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-5236e41 elementor-widget elementor-widget-spacer\" data-id=\"5236e41\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1cb057c elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"1cb057c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a20909b\" data-id=\"a20909b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f6d87ca wpr-grid-columns-3 wpr-grid-columns--tablet2 wpr-grid-columns--mobile1 wpr-item-styles-inner elementor-widget elementor-widget-wpr-grid\" data-id=\"f6d87ca\" data-element_type=\"widget\" data-widget_type=\"wpr-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"wpr-grid-filters elementor-clearfix wpr-grid-filters-sep-right\"><li class=\" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-none\"><span  data-filter=\"*\" class=\"wpr-grid-filters-item wpr-active-filter \">All Posts<\/span><em class=\"wpr-grid-filters-sep\"><\/em><\/li><li class=\" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-none\"><span   data-ajax-filter=[\"category\",\"anglais\"]  data-filter=\".category-anglais\">Anglais<\/span><em class=\"wpr-grid-filters-sep\"><\/em><\/li><li class=\" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-none\"><span   data-ajax-filter=[\"category\",\"borne-de-reception-digitale\"]  data-filter=\".category-borne-de-reception-digitale\">Borne de r\u00e9ception digitale<\/span><em class=\"wpr-grid-filters-sep\"><\/em><\/li><li class=\" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-none\"><span   data-ajax-filter=[\"category\",\"cloud\"]  data-filter=\".category-cloud\">Cloud<\/span><em class=\"wpr-grid-filters-sep\"><\/em><\/li><li class=\" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-none\"><span   data-ajax-filter=[\"category\",\"cybersecurite\"]  data-filter=\".category-cybersecurite\">Cybers\u00e9curit\u00e9<\/span><em class=\"wpr-grid-filters-sep\"><\/em><\/li><li class=\" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-none\"><span   data-ajax-filter=[\"category\",\"cybersecurity\"]  data-filter=\".category-cybersecurity\">Cybersecurity<\/span><em class=\"wpr-grid-filters-sep\"><\/em><\/li><li class=\" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-none\"><span   data-ajax-filter=[\"category\",\"francais\"]  data-filter=\".category-francais\">Fran\u00e7ais<\/span><em class=\"wpr-grid-filters-sep\"><\/em><\/li><li class=\" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-none\"><span   data-ajax-filter=[\"category\",\"france\"]  data-filter=\".category-france\">France<\/span><em class=\"wpr-grid-filters-sep\"><\/em><\/li><li class=\" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-none\"><span   data-ajax-filter=[\"category\",\"non-classe\"]  data-filter=\".category-non-classe\">Non class\u00e9<\/span><em class=\"wpr-grid-filters-sep\"><\/em><\/li><li class=\" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-none\"><span   data-ajax-filter=[\"category\",\"plateforme-invoicing\"]  data-filter=\".category-plateforme-invoicing\">Plateforme Invoicing<\/span><em class=\"wpr-grid-filters-sep\"><\/em><\/li><li class=\" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-none\"><span   data-ajax-filter=[\"category\",\"plateforme-mailing-en-croissance\"]  data-filter=\".category-plateforme-mailing-en-croissance\">Plateforme Mailing en Croissance<\/span><em class=\"wpr-grid-filters-sep\"><\/em><\/li><li class=\" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-none\"><span   data-ajax-filter=[\"category\",\"politique-rse-ekinops\"]  data-filter=\".category-politique-rse-ekinops\">Politique RSE EKINOPS<\/span><em class=\"wpr-grid-filters-sep\"><\/em><\/li><li class=\" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-none\"><span   data-ajax-filter=[\"category\",\"reseau\"]  data-filter=\".category-reseau\">R\u00e9seau<\/span><em class=\"wpr-grid-filters-sep\"><\/em><\/li><li class=\" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-none\"><span   data-ajax-filter=[\"category\",\"tunisie\"]  data-filter=\".category-tunisie\">Tunisie<\/span><em class=\"wpr-grid-filters-sep\"><\/em><\/li><\/ul><section class=\"wpr-grid elementor-clearfix\" data-settings=\"{&quot;layout&quot;:&quot;fitRows&quot;,&quot;stick_last_element_to_bottom&quot;:&quot;&quot;,&quot;columns_desktop&quot;:3,&quot;gutter_hr&quot;:15,&quot;gutter_hr_mobile&quot;:15,&quot;gutter_hr_mobile_extra&quot;:15,&quot;gutter_hr_tablet&quot;:15,&quot;gutter_hr_tablet_extra&quot;:15,&quot;gutter_hr_laptop&quot;:15,&quot;gutter_hr_widescreen&quot;:15,&quot;gutter_vr&quot;:15,&quot;gutter_vr_mobile&quot;:&quot;&quot;,&quot;gutter_vr_mobile_extra&quot;:&quot;&quot;,&quot;gutter_vr_tablet&quot;:&quot;&quot;,&quot;gutter_vr_tablet_extra&quot;:15,&quot;gutter_vr_laptop&quot;:15,&quot;gutter_vr_widescreen&quot;:15,&quot;animation&quot;:&quot;default&quot;,&quot;animation_duration&quot;:0.3,&quot;animation_delay&quot;:0.1,&quot;deeplinking&quot;:&quot;&quot;,&quot;filters_linkable&quot;:&quot;no&quot;,&quot;filters_default_filter&quot;:&quot;&quot;,&quot;filters_count&quot;:&quot;&quot;,&quot;filters_hide_empty&quot;:&quot;no&quot;,&quot;filters_animation&quot;:&quot;default&quot;,&quot;filters_animation_duration&quot;:0.3,&quot;filters_animation_delay&quot;:0.1,&quot;pagination_type&quot;:&quot;load-more&quot;,&quot;pagination_max_pages&quot;:1,&quot;lightbox&quot;:{&quot;selector&quot;:&quot;.wpr-grid-image-wrap&quot;,&quot;iframeMaxWidth&quot;:&quot;60%&quot;,&quot;hash&quot;:false,&quot;autoplay&quot;:&quot;true&quot;,&quot;pause&quot;:5000,&quot;progressBar&quot;:&quot;true&quot;,&quot;counter&quot;:&quot;true&quot;,&quot;controls&quot;:&quot;true&quot;,&quot;getCaptionFromTitleOrAlt&quot;:&quot;true&quot;,&quot;thumbnail&quot;:&quot;&quot;,&quot;showThumbByDefault&quot;:&quot;&quot;,&quot;share&quot;:&quot;&quot;,&quot;zoom&quot;:&quot;true&quot;,&quot;fullScreen&quot;:&quot;true&quot;,&quot;download&quot;:&quot;true&quot;}}\"><article class=\"wpr-grid-item elementor-clearfix post-7528 post type-post status-publish format-standard has-post-thumbnail hentry category-reseau tag-blog\"><div class=\"wpr-grid-item-inner\"><div class=\"wpr-grid-media-wrap wpr-effect-size-medium \" data-overlay-link=\"yes\"><div class=\"wpr-grid-image-wrap\" data-src=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/04\/Banniere-blog-Sandvine-_1-_1_.webp\" data-img-on-hover=\"\"  data-src-secondary=\"\"><img decoding=\"async\" data-no-lazy=\"1\" src=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/04\/Banniere-blog-Sandvine-_1-_1_.webp\" alt=\"Banni\u00e8re blog la politique RSE ekinops\" class=\"wpr-anim-timing-ease-default\"><\/div><div class=\"wpr-grid-media-hover wpr-animation-wrap\"><div class=\"wpr-grid-media-hover-bg  wpr-overlay-fade-in wpr-anim-size-large wpr-anim-timing-ease-default wpr-anim-transparency\" data-url=\"https:\/\/ipsip.eu\/fr\/rse-appels-offres-it\/\"><\/div><\/div><\/div><div class=\"wpr-grid-item-below-content elementor-clearfix\"><h2 class=\"wpr-grid-item-title elementor-repeater-item-e754539 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-fade\"><div class=\"inner-block\"><a target=\"_self\"  href=\"https:\/\/ipsip.eu\/fr\/rse-appels-offres-it\/\">La RSE : un nouveau crit\u00e8re diff\u00e9renciant pour les appels d&rsquo;offres IT.<\/a><\/div><\/h2><div class=\"wpr-grid-item-excerpt elementor-repeater-item-9bec7e9 wpr-grid-item-display-block wpr-grid-item-align-left\"><div class=\"inner-block\"><p>En quoi d\u00e9finir sa politique RSE peut faire pencher la balance en votre faveur pour remporter un appel d&#039;offre ?<\/p><\/div><\/div><div class=\"wpr-grid-item-read-more elementor-repeater-item-1d09afe wpr-grid-item-display-block wpr-grid-item-align-left\"><div class=\"inner-block\"><a target=\"_self\" href=\"https:\/\/ipsip.eu\/fr\/rse-appels-offres-it\/\" class=\"wpr-button-effect wpr-button-none\"><span>En savoir plus<\/span><\/a><\/div><\/div><\/div><\/div><\/article><article class=\"wpr-grid-item elementor-clearfix post-7383 post type-post status-publish format-standard has-post-thumbnail hentry category-politique-rse-ekinops tag-etudes-de-cas\"><div class=\"wpr-grid-item-inner\"><div class=\"wpr-grid-media-wrap wpr-effect-size-medium \" data-overlay-link=\"yes\"><div class=\"wpr-grid-image-wrap\" data-src=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/04\/Banniere-blog-Sandvine-1-8.png\" data-img-on-hover=\"\"  data-src-secondary=\"\"><img decoding=\"async\" data-no-lazy=\"1\" src=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/04\/Banniere-blog-Sandvine-1-8.png\" alt=\"La politique RSE d&rsquo;Ekinops, facteur cl\u00e9 de succ\u00e8s pour un op\u00e9rateur t\u00e9l\u00e9com\" class=\"wpr-anim-timing-ease-default\"><\/div><div class=\"wpr-grid-media-hover wpr-animation-wrap\"><div class=\"wpr-grid-media-hover-bg  wpr-overlay-fade-in wpr-anim-size-large wpr-anim-timing-ease-default wpr-anim-transparency\" data-url=\"https:\/\/ipsip.eu\/fr\/politique-rse-ekinops-operateur-telecom\/\"><\/div><\/div><\/div><div class=\"wpr-grid-item-below-content elementor-clearfix\"><h2 class=\"wpr-grid-item-title elementor-repeater-item-e754539 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-fade\"><div class=\"inner-block\"><a target=\"_self\"  href=\"https:\/\/ipsip.eu\/fr\/politique-rse-ekinops-operateur-telecom\/\">La politique RSE d&rsquo;Ekinops, facteur cl\u00e9 de succ\u00e8s pour un op\u00e9rateur t\u00e9l\u00e9com<\/a><\/div><\/h2><div class=\"wpr-grid-item-excerpt elementor-repeater-item-9bec7e9 wpr-grid-item-display-block wpr-grid-item-align-left\"><div class=\"inner-block\"><p>Politique RSE : comment un op\u00e9rateur t\u00e9l\u00e9com a pu remporter un appel d&#039;offres gr\u00e2ce \u00e0 la strat\u00e9gie RSE d&#039;EKINOPS<\/p><\/div><\/div><div class=\"wpr-grid-item-read-more elementor-repeater-item-1d09afe wpr-grid-item-display-block wpr-grid-item-align-left\"><div class=\"inner-block\"><a target=\"_self\" href=\"https:\/\/ipsip.eu\/fr\/politique-rse-ekinops-operateur-telecom\/\" class=\"wpr-button-effect wpr-button-none\"><span>En savoir plus<\/span><\/a><\/div><\/div><\/div><\/div><\/article><article class=\"wpr-grid-item elementor-clearfix post-6784 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurite tag-blog\"><div class=\"wpr-grid-item-inner\"><div class=\"wpr-grid-media-wrap wpr-effect-size-medium \" data-overlay-link=\"yes\"><div class=\"wpr-grid-image-wrap\" data-src=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/03\/Banniere-blog-Sandvine-_1-_6_.webp\" data-img-on-hover=\"\"  data-src-secondary=\"\"><img decoding=\"async\" data-no-lazy=\"1\" src=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/03\/Banniere-blog-Sandvine-_1-_6_.webp\" alt=\"La solution de chiffrement des donn\u00e9es confidentielles \" class=\"wpr-anim-timing-ease-default\"><\/div><div class=\"wpr-grid-media-hover wpr-animation-wrap\"><div class=\"wpr-grid-media-hover-bg  wpr-overlay-fade-in wpr-anim-size-large wpr-anim-timing-ease-default wpr-anim-transparency\" data-url=\"https:\/\/ipsip.eu\/fr\/la-solution-de-chiffrement-de-vos-donnees-confidentielles\/\"><\/div><\/div><\/div><div class=\"wpr-grid-item-below-content elementor-clearfix\"><h2 class=\"wpr-grid-item-title elementor-repeater-item-e754539 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-fade\"><div class=\"inner-block\"><a target=\"_self\"  href=\"https:\/\/ipsip.eu\/fr\/la-solution-de-chiffrement-de-vos-donnees-confidentielles\/\">La solution de chiffrement pour ne laisser personne acc\u00e9der \u00e0 vos donn\u00e9es confidentielles<\/a><\/div><\/h2><div class=\"wpr-grid-item-excerpt elementor-repeater-item-9bec7e9 wpr-grid-item-display-block wpr-grid-item-align-left\"><div class=\"inner-block\"><p>La solution de chiffrement de vos donn\u00e9es confidentielles : d\u00e9couvrez dans cet article la bonne pratique \u00e0 adopter d\u00e8s maintenant...<\/p><\/div><\/div><div class=\"wpr-grid-item-read-more elementor-repeater-item-1d09afe wpr-grid-item-display-block wpr-grid-item-align-left\"><div class=\"inner-block\"><a target=\"_self\" href=\"https:\/\/ipsip.eu\/fr\/la-solution-de-chiffrement-de-vos-donnees-confidentielles\/\" class=\"wpr-button-effect wpr-button-none\"><span>En savoir plus<\/span><\/a><\/div><\/div><\/div><\/div><\/article><\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Comment notre client a renforc\u00e9 sa cybers\u00e9curit\u00e9 ? SOC 24\/7<\/p>\n","protected":false},"author":4,"featured_media":7731,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[17],"class_list":["post-7650","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-etudes-de-cas"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Comment notre client a renforc\u00e9 sa cybers\u00e9curit\u00e9 ? SOC 24\/7<\/title>\n<meta name=\"description\" content=\"Externaliser son SOC : dans cette \u00e9tude de cas d\u00e9couvrez comment notre client a su renforcer sa cybers\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ipsip.eu\/fr\/externalisation-soc\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment notre client a renforc\u00e9 sa cybers\u00e9curit\u00e9 ? SOC 24\/7\" \/>\n<meta property=\"og:description\" content=\"Externaliser son SOC : dans cette \u00e9tude de cas d\u00e9couvrez comment notre client a su renforcer sa cybers\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ipsip.eu\/fr\/externalisation-soc\/\" \/>\n<meta property=\"og:site_name\" content=\"Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\/7, solutions IT\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-03T08:51:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-27T14:14:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/06\/SOC-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Lucie Cazanave Pin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lucie Cazanave Pin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/externalisation-soc\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/externalisation-soc\\\/\"},\"author\":{\"name\":\"Lucie Cazanave Pin\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/#\\\/schema\\\/person\\\/018bf1ff3342010b31fef317fb455b3a\"},\"headline\":\"Externalisation d&rsquo;un SOC\",\"datePublished\":\"2024-06-03T08:51:34+00:00\",\"dateModified\":\"2025-06-27T14:14:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/externalisation-soc\\\/\"},\"wordCount\":1259,\"image\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/externalisation-soc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ipsip.eu\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/SOC-1.webp\",\"keywords\":[\"\u00e9tudes de cas\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/externalisation-soc\\\/\",\"url\":\"https:\\\/\\\/ipsip.eu\\\/externalisation-soc\\\/\",\"name\":\"Comment notre client a renforc\u00e9 sa cybers\u00e9curit\u00e9 ? SOC 24\\\/7\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/externalisation-soc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/externalisation-soc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ipsip.eu\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/SOC-1.webp\",\"datePublished\":\"2024-06-03T08:51:34+00:00\",\"dateModified\":\"2025-06-27T14:14:33+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/#\\\/schema\\\/person\\\/018bf1ff3342010b31fef317fb455b3a\"},\"description\":\"Externaliser son SOC : dans cette \u00e9tude de cas d\u00e9couvrez comment notre client a su renforcer sa cybers\u00e9curit\u00e9.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ipsip.eu\\\/externalisation-soc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/externalisation-soc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ipsip.eu\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/SOC-1.webp\",\"contentUrl\":\"https:\\\/\\\/ipsip.eu\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/SOC-1.webp\",\"width\":1920,\"height\":1080,\"caption\":\"SOC IPSIP Group\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/#website\",\"url\":\"https:\\\/\\\/ipsip.eu\\\/\",\"name\":\"Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\\\/7, solutions IT\",\"description\":\"Make IT Easy\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ipsip.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/#\\\/schema\\\/person\\\/018bf1ff3342010b31fef317fb455b3a\",\"name\":\"Lucie Cazanave Pin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g\",\"caption\":\"Lucie Cazanave Pin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment notre client a renforc\u00e9 sa cybers\u00e9curit\u00e9 ? SOC 24\/7","description":"Externaliser son SOC : dans cette \u00e9tude de cas d\u00e9couvrez comment notre client a su renforcer sa cybers\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ipsip.eu\/fr\/externalisation-soc\/","og_locale":"fr_FR","og_type":"article","og_title":"Comment notre client a renforc\u00e9 sa cybers\u00e9curit\u00e9 ? SOC 24\/7","og_description":"Externaliser son SOC : dans cette \u00e9tude de cas d\u00e9couvrez comment notre client a su renforcer sa cybers\u00e9curit\u00e9.","og_url":"https:\/\/ipsip.eu\/fr\/externalisation-soc\/","og_site_name":"Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\/7, solutions IT","article_published_time":"2024-06-03T08:51:34+00:00","article_modified_time":"2025-06-27T14:14:33+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/06\/SOC-1.webp","type":"image\/webp"}],"author":"Lucie Cazanave Pin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Lucie Cazanave Pin","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ipsip.eu\/externalisation-soc\/#article","isPartOf":{"@id":"https:\/\/ipsip.eu\/externalisation-soc\/"},"author":{"name":"Lucie Cazanave Pin","@id":"https:\/\/ipsip.eu\/#\/schema\/person\/018bf1ff3342010b31fef317fb455b3a"},"headline":"Externalisation d&rsquo;un SOC","datePublished":"2024-06-03T08:51:34+00:00","dateModified":"2025-06-27T14:14:33+00:00","mainEntityOfPage":{"@id":"https:\/\/ipsip.eu\/externalisation-soc\/"},"wordCount":1259,"image":{"@id":"https:\/\/ipsip.eu\/externalisation-soc\/#primaryimage"},"thumbnailUrl":"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/06\/SOC-1.webp","keywords":["\u00e9tudes de cas"],"articleSection":["Cybersecurity"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/ipsip.eu\/externalisation-soc\/","url":"https:\/\/ipsip.eu\/externalisation-soc\/","name":"Comment notre client a renforc\u00e9 sa cybers\u00e9curit\u00e9 ? SOC 24\/7","isPartOf":{"@id":"https:\/\/ipsip.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ipsip.eu\/externalisation-soc\/#primaryimage"},"image":{"@id":"https:\/\/ipsip.eu\/externalisation-soc\/#primaryimage"},"thumbnailUrl":"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/06\/SOC-1.webp","datePublished":"2024-06-03T08:51:34+00:00","dateModified":"2025-06-27T14:14:33+00:00","author":{"@id":"https:\/\/ipsip.eu\/#\/schema\/person\/018bf1ff3342010b31fef317fb455b3a"},"description":"Externaliser son SOC : dans cette \u00e9tude de cas d\u00e9couvrez comment notre client a su renforcer sa cybers\u00e9curit\u00e9.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ipsip.eu\/externalisation-soc\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ipsip.eu\/externalisation-soc\/#primaryimage","url":"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/06\/SOC-1.webp","contentUrl":"https:\/\/ipsip.eu\/wp-content\/uploads\/2024\/06\/SOC-1.webp","width":1920,"height":1080,"caption":"SOC IPSIP Group"},{"@type":"WebSite","@id":"https:\/\/ipsip.eu\/#website","url":"https:\/\/ipsip.eu\/","name":"Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\/7, solutions IT","description":"Make IT Easy","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ipsip.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/ipsip.eu\/#\/schema\/person\/018bf1ff3342010b31fef317fb455b3a","name":"Lucie Cazanave Pin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g","caption":"Lucie Cazanave Pin"}}]}},"_links":{"self":[{"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/posts\/7650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/comments?post=7650"}],"version-history":[{"count":124,"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/posts\/7650\/revisions"}],"predecessor-version":[{"id":8817,"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/posts\/7650\/revisions\/8817"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/media\/7731"}],"wp:attachment":[{"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/media?parent=7650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/categories?post=7650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/tags?post=7650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}