{"id":86257,"date":"2022-05-06T11:04:36","date_gmt":"2022-05-06T09:04:36","guid":{"rendered":"https:\/\/becoms.tech\/?page_id=86257"},"modified":"2022-05-09T11:27:01","modified_gmt":"2022-05-09T09:27:01","slug":"consulting-security","status":"publish","type":"page","link":"https:\/\/becoms.tech\/en\/consulting-security\/","title":{"rendered":"Consulting &#038; Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row row_height_percent=&#8221;70&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;5&#8243; bottom_padding=&#8221;5&#8243; back_color=&#8221;color-wayh&#8221; back_image=&#8221;84985&#8243; kburns=&#8221;yes&#8221; overlay_color=&#8221;color-wayh&#8221; overlay_alpha=&#8221;50&#8243; equal_height=&#8221;yes&#8221; gutter_size=&#8221;0&#8243; column_width_use_pixel=&#8221;yes&#8221; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; row_name=&#8221;Welcome&#8221;][vc_column column_width_use_pixel=&#8221;yes&#8221; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; css=&#8221;.vc_custom_1592388109541{padding-top: 50px !important;}&#8221;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; limit_content=&#8221;&#8221;][vc_column_inner column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h1&#8243; text_size=&#8221;fontsize-338686&#8243; text_weight=&#8221;800&#8243; text_transform=&#8221;uppercase&#8221; text_height=&#8221;fontheight-179065&#8243; text_space=&#8221;fontspace-111509&#8243; css_animation=&#8221;bottom-t-top&#8221; animation_delay=&#8221;600&#8243; title=&#8221;&#8221; uncode_shortcode_id=&#8221;781983&#8243; text_color_type=&#8221;uncode-palette&#8221; text_color_solid=&#8221;#ff0000&#8243;]Consulting &amp; Security[\/vc_custom_heading][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; limit_content=&#8221;&#8221;][vc_column_inner column_width_use_pixel=&#8221;yes&#8221; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; column_width_pixel=&#8221;740&#8243;][vc_column_text text_lead=&#8221;yes&#8221; css_animation=&#8221;bottom-t-top&#8221; animation_delay=&#8221;600&#8243; uncode_shortcode_id=&#8221;202648&#8243; text_color_type=&#8221;uncode-palette&#8221; text_color_solid=&#8221;#ff0000&#8243; border_color_type=&#8221;uncode-palette&#8221; border_color_solid=&#8221;#ff0000&#8243;]Becoms engineers at your service to analyze and certify the security of your infrastructure and your applications. An essential step to comply with the GDPR.[\/vc_column_text][vc_button button_color=&#8221;accent&#8221; radius=&#8221;btn-round&#8221; hover_fx=&#8221;full-colored&#8221; outline=&#8221;yes&#8221; shadow=&#8221;yes&#8221; shadow_weight=&#8221;std&#8221; border_width=&#8221;0&#8243; css_animation=&#8221;bottom-t-top&#8221; animation_delay=&#8221;800&#8243; link=&#8221;url:https%3A%2F%2Fbecoms.tech%2Fen%2Fcontact-us%2F|title:Contact%20us&#8221; button_color_type=&#8221;uncode-palette&#8221; button_color_solid=&#8221;#ff0000&#8243; uncode_shortcode_id=&#8221;476210&#8243;]Contact us[\/vc_button][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;5&#8243; bottom_padding=&#8221;2&#8243; back_color=&#8221;color-xsdn&#8221; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;4&#8243; column_width_use_pixel=&#8221;yes&#8221; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; enable_bottom_divider=&#8221;default&#8221; bottom_divider=&#8221;step&#8221; shape_bottom_h_use_pixel=&#8221;&#8221; shape_bottom_height=&#8221;150&#8243; shape_bottom_opacity=&#8221;100&#8243; shape_bottom_index=&#8221;0&#8243; el_class=&#8221;inverted-device-order&#8221; column_width_pixel=&#8221;640&#8243;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; align_mobile=&#8221;align_left_mobile&#8221; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading text_color=&#8221;accent&#8221; heading_semantic=&#8221;h6&#8243; text_size=&#8221;fontsize-160000&#8243; text_transform=&#8221;uppercase&#8221; text_space=&#8221;fontspace-135905&#8243; uncode_shortcode_id=&#8221;108026&#8243; text_color_type=&#8221;uncode-palette&#8221; text_color_solid=&#8221;#ff0000&#8243;]Our service[\/vc_custom_heading][vc_custom_heading sub_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;181401&#8243; text_color_type=&#8221;uncode-palette&#8221; text_color_solid=&#8221;#ff0000&#8243;]expertise, advice, certification[\/vc_custom_heading][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;183256&#8243; text_color_type=&#8221;uncode-palette&#8221; text_color_solid=&#8221;#ff0000&#8243; border_color_type=&#8221;uncode-palette&#8221; border_color_solid=&#8221;#ff0000&#8243;]With extensive experience in the field of IT security, we offer a consulting service to help companies move towards an infrastructure or development that is optimized and flawless in terms of security.[\/vc_column_text][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;1&#8243; bottom_padding=&#8221;5&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_icon icon_image=&#8221;85885&#8243; icon_color=&#8221;accent&#8221; text_size=&#8221;h4&#8243; text_weight=&#8221;500&#8243; css_animation=&#8221;bottom-t-top&#8221; title=&#8221;Optimization of your development&#8221; uncode_shortcode_id=&#8221;107746&#8243; icon_color_type=&#8221;uncode-palette&#8221; icon_color_solid=&#8221;#ff0000&#8243;]Audit of the code of your software and Web applications with a complete report of the improvements to be made on the maintainability, quality, security and performance of your development.[\/vc_icon][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; equal_height=&#8221;yes&#8221; gutter_size=&#8221;4&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; limit_content=&#8221;&#8221;][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; css_animation=&#8221;bottom-t-top&#8221; animation_delay=&#8221;300&#8243; width=&#8221;1\/2&#8243;][vc_icon icon_image=&#8221;85884&#8243; icon_color=&#8221;accent&#8221; text_size=&#8221;h4&#8243; text_weight=&#8221;500&#8243; title=&#8221;The Empire Strikes Back&#8221; uncode_shortcode_id=&#8221;194371&#8243; icon_color_type=&#8221;uncode-palette&#8221; icon_color_solid=&#8221;#ff0000&#8243;]We train your staff in good security practices such as the detection of fake emails or the password policy to respect. Result: 60% of cyber-attacks avoided.[\/vc_icon][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; equal_height=&#8221;yes&#8221; gutter_size=&#8221;4&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; limit_content=&#8221;&#8221;][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; css_animation=&#8221;bottom-t-top&#8221; width=&#8221;1\/1&#8243;][vc_icon icon_image=&#8221;85882&#8243; icon_color=&#8221;accent&#8221; media_size=&#8221;48&#8243; text_size=&#8221;h4&#8243; text_weight=&#8221;500&#8243; css_animation=&#8221;bottom-t-top&#8221; animation_delay=&#8221;600&#8243; title=&#8221;An exclusive security label&#8221; link_text=&#8221;En savoir plus&#8221; link=&#8221;|title:En%20savoir%20plus||&#8221; uncode_shortcode_id=&#8221;127878&#8243; icon_color_type=&#8221;uncode-palette&#8221; icon_color_solid=&#8221;#ff0000&#8243;]Audit the IT security of your infrastructure and your software and applications and offer your company a security label that will reassure your customers.[\/vc_icon][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;3&#8243; bottom_padding=&#8221;3&#8243; back_color=&#8221;color-wayh&#8221; overlay_alpha=&#8221;50&#8243; equal_height=&#8221;yes&#8221; gutter_size=&#8221;4&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_right&#8221; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; align_medium=&#8221;align_center_tablet&#8221; medium_width=&#8221;0&#8243; align_mobile=&#8221;align_center_mobile&#8221; mobile_width=&#8221;0&#8243; width=&#8221;4\/12&#8243;][uncode_counter value=&#8221;42&#8243; counter_color=&#8221;accent&#8221; font=&#8221;font-643061&#8243; size=&#8221;fontsize-160206&#8243; weight=&#8221;600&#8243; height=&#8221;fontheight-179065&#8243; suffix=&#8221;%&#8221;][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; align_medium=&#8221;align_center_tablet&#8221; medium_width=&#8221;0&#8243; align_mobile=&#8221;align_center_mobile&#8221; mobile_width=&#8221;0&#8243; width=&#8221;8\/12&#8243;][vc_custom_heading text_color=&#8221;accent&#8221; heading_semantic=&#8221;h6&#8243; text_size=&#8221;fontsize-160000&#8243; text_transform=&#8221;uppercase&#8221; text_space=&#8221;fontspace-135905&#8243; uncode_shortcode_id=&#8221;186053&#8243; text_color_type=&#8221;uncode-palette&#8221; text_color_solid=&#8221;#ff0000&#8243;]sensible soul to withhold[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;fontsize-155944&#8243; uncode_shortcode_id=&#8221;178760&#8243; text_color_type=&#8221;uncode-palette&#8221; text_color_solid=&#8221;#ff0000&#8243;]is the number of French SMEs that are attacked each year[\/vc_custom_heading][vc_column_text uncode_shortcode_id=&#8221;108037&#8243; text_color_type=&#8221;uncode-palette&#8221; text_color_solid=&#8221;#ff0000&#8243; border_color_type=&#8221;uncode-palette&#8221; border_color_solid=&#8221;#ff0000&#8243;]The main attack types are phishing, malware and ransomware. But digital transformation has accelerated these cyberattacks and now also targets your web applications with 77% having at least one vulnerability on first scan![\/vc_column_text][\/vc_column][\/vc_row][vc_row unlock_row_content=&#8221;yes&#8221; row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;0&#8243; top_padding=&#8221;0&#8243; bottom_padding=&#8221;0&#8243; overlay_alpha=&#8221;100&#8243; equal_height=&#8221;yes&#8221; gutter_size=&#8221;0&#8243; shift_y=&#8221;0&#8243; style=&#8221;inherited&#8221;][vc_column column_width_percent=&#8221;100&#8243; position_horizontal=&#8221;left&#8221; gutter_size=&#8221;3&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;5&#8243; back_color=&#8221;color-xsdn&#8221; overlay_alpha=&#8221;100&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;100&#8243; mobile_width=&#8221;0&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/3&#8243; safe_padding=&#8221;yes&#8221;][vc_custom_heading heading_semantic=&#8221;h3&#8243; uncode_shortcode_id=&#8221;204389&#8243; text_color_type=&#8221;uncode-palette&#8221; text_color_solid=&#8221;#ff0000&#8243;]Choose the right team![\/vc_custom_heading][vc_column_text uncode_shortcode_id=&#8221;120878&#8243; text_color_type=&#8221;uncode-palette&#8221; text_color_solid=&#8221;#ff0000&#8243; border_color_type=&#8221;uncode-palette&#8221; border_color_solid=&#8221;#ff0000&#8243;]The choice of the team depends on the task you entrust to us.<br \/>\nThis may be your business application developed on which you do not have access, in this case the red team is suitable. Or it can be your IT infrastructure as a whole and the choice of the Purple or the Blue team is ideal. We are here to guide you on this choice, do not hesitate.[\/vc_column_text][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; position_horizontal=&#8221;left&#8221; gutter_size=&#8221;3&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;5&#8243; back_color=&#8221;color-gyho&#8221; overlay_alpha=&#8221;0&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;100&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;2\/3&#8243; safe_padding=&#8221;yes&#8221;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;4&#8243; shift_y=&#8221;0&#8243; limit_content=&#8221;&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_icon icon=&#8221;fa fa-shield2&#8243; icon_color=&#8221;color-632047&#8243; size=&#8221;fa-4x&#8221; text_size=&#8221;h4&#8243; align=&#8221;left&#8221; title=&#8221;RED TEAM&#8221; uncode_shortcode_id=&#8221;674322&#8243; icon_color_type=&#8221;uncode-palette&#8221; icon_color_solid=&#8221;#ff0000&#8243;]The red team simulates the behavior of a malicious third party with no prior knowledge of your information system and trying to access it from the Internet. This audit is carried out without any prior information provided by the client.[\/vc_icon][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_icon icon=&#8221;fa fa-shield2&#8243; icon_color=&#8221;color-vyce&#8221; size=&#8221;fa-4x&#8221; text_size=&#8221;h4&#8243; align=&#8221;left&#8221; title=&#8221;BLUE TEAM&#8221; uncode_shortcode_id=&#8221;150999&#8243; icon_color_type=&#8221;uncode-palette&#8221; icon_color_solid=&#8221;#ff0000&#8243;]With the BLUE team we put ourselves in the shoes of a defender, therefore internal to your company. We have access to the source code and any other elements that may affect the security of your web application[\/vc_icon][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_icon icon=&#8221;fa fa-shield2&#8243; icon_color=&#8221;color-482803&#8243; size=&#8221;fa-4x&#8221; text_size=&#8221;h4&#8243; align=&#8221;left&#8221; title=&#8221;PURPLE TEAM&#8221; uncode_shortcode_id=&#8221;153500&#8243; icon_color_type=&#8221;uncode-palette&#8221; icon_color_solid=&#8221;#ff0000&#8243;]Mix of the Red team and the Blue Team, the PURPLE team passes all the parameters of your security. Whether internal or from an external point of view.[\/vc_icon][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;5&#8243; bottom_padding=&#8221;5&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;4&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; css_animation=&#8221;left-t-right&#8221; width=&#8221;1\/2&#8243;][vc_single_image media=&#8221;85253&#8243; media_width_percent=&#8221;100&#8243;][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; css_animation=&#8221;right-t-left&#8221; animation_delay=&#8221;100&#8243; width=&#8221;1\/2&#8243;][vc_custom_heading text_size=&#8221;fontsize-155944&#8243; separator=&#8221;yes&#8221; separator_color=&#8221;yes&#8221; sub_lead=&#8221;yes&#8221; subheading=&#8221;Many security solutions and products are offered by Becoms. And like in a nightclub, the doorman won&#8217;t let you in if you don&#8217;t meet the establishment&#8217;s requirements.&#8221; uncode_shortcode_id=&#8221;137225&#8243; text_color_type=&#8221;uncode-palette&#8221; text_color_solid=&#8221;#ff0000&#8243;]You are in sneakers, you<br \/>\n<em class=\"font-175345 font-weight-500\">don&#8217;t come in<span class=\"text-accent-color\">!<\/span><\/em>[\/vc_custom_heading][uncode_list icon=&#8221;fa fa-check-circle&#8221; icon_color=&#8221;accent&#8221; uncode_shortcode_id=&#8221;429692&#8243; icon_color_type=&#8221;uncode-palette&#8221; icon_color_solid=&#8221;#ff0000&#8243;]<\/p>\n<ul>\n<li>Firewall \/ Firewall<\/li>\n<li>Secure VPN and Remote Access<\/li>\n<li>Authentication and access rights<\/li>\n<li>Endpoint, Antivirus<\/li>\n<li>Antispam, Phishing<\/li>\n<li>Ultra-secure backup strategy<\/li>\n<li>PRA report (return to activity plan)<\/li>\n<li>Data encryption<br \/>\n&#8230;<\/li>\n<\/ul>\n<p>[\/uncode_list][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; equal_height=&#8221;yes&#8221; gutter_size=&#8221;4&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_use_pixel=&#8221;yes&#8221; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; column_width_pixel=&#8221;900&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h1&#8243; uncode_shortcode_id=&#8221;187871&#8243; text_color_type=&#8221;uncode-palette&#8221; text_color_solid=&#8221;#ff0000&#8243;]Certified by <em class=\"font-175345 font-weight-500\">security leaders<\/em><span class=\"text-accent-color\">.<\/span>[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;2&#8243; bottom_padding=&#8221;5&#8243; overlay_alpha=&#8221;50&#8243; equal_height=&#8221;yes&#8221; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; el_class=&#8221;inverted-device-order&#8221;][vc_column width=&#8221;1\/6&#8243;][vc_single_image media=&#8221;85269&#8243; media_width_percent=&#8221;100&#8243; alignment=&#8221;center&#8221;][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/6&#8243;][vc_single_image media=&#8221;85274&#8243; media_width_percent=&#8221;100&#8243; alignment=&#8221;center&#8221;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][vc_single_image media=&#8221;85275&#8243; media_width_percent=&#8221;100&#8243;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][vc_single_image media=&#8221;85262&#8243; media_width_percent=&#8221;100&#8243;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][vc_single_image media=&#8221;85272&#8243; media_width_percent=&#8221;100&#8243;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][vc_single_image media=&#8221;85268&#8243; media_width_percent=&#8221;100&#8243;][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;7&#8243; bottom_padding=&#8221;7&#8243; back_color=&#8221;color-wayh&#8221; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;4&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;-5&#8243; shift_y_down=&#8221;-5&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; limit_content=&#8221;&#8221;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;6\/12&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;fontsize-155944&#8243; uncode_shortcode_id=&#8221;701064&#8243; text_color_type=&#8221;uncode-palette&#8221; text_color_solid=&#8221;#ff0000&#8243;]Safety approvals to display proudly to reassure your customers<\/p>\n<p>&nbsp;[\/vc_custom_heading][vc_column_text css=&#8221;.vc_custom_1651828863415{margin-top: 10px !important;}&#8221; uncode_shortcode_id=&#8221;153719&#8243; text_color_type=&#8221;uncode-palette&#8221; text_color_solid=&#8221;#ff0000&#8243; border_color_type=&#8221;uncode-palette&#8221; border_color_solid=&#8221;#ff0000&#8243;]<em>&#8211; After passing through the Red Team, Blue Team or Purple Team of Becoms: you will be CWAS or CIAS approved for 1 year. You will be able to communicate to your customers and partners, through our labels, that your IT security is under control.<\/em>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner limit_content=&#8221;&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image media=&#8221;83052&#8243; media_width_percent=&#8221;50&#8243; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image media=&#8221;83050&#8243; media_width_percent=&#8221;50&#8243; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image media=&#8221;83051&#8243; media_width_percent=&#8221;50&#8243; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;5&#8243; bottom_padding=&#8221;5&#8243; back_color=&#8221;color-wayh&#8221; overlay_alpha=&#8221;80&#8243; gutter_size=&#8221;0&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; style=&#8221;inherited&#8221; el_id=&#8221;prix&#8221;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; shadow=&#8221;std&#8221; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/3&#8243; link_to=&#8221;|||&#8221;][uncode_pricing title=&#8221;WEB SECURITY AUDIT|Red team*&#8221; price=&#8221;1500\u20ac|with CWAS label included for 1 year&#8221; hover_fx=&#8221;outlined&#8221; price_color=&#8221;color-632047&#8243; body=&#8221;Analyze and report|on the languages  and architectures used for the code<br \/>\nAnalysis, testing and reporting|on security vulnerabilities<br \/>\nFull report|with screenshots and descriptions of analyzes and tests<br \/>\nRecommendations&#8221; button=&#8221;url:https%3A%2F%2Fbecoms.tech%2Fen%2Fcontact-us%2F|title:Contact%20us&#8221; uncode_shortcode_id=&#8221;138392&#8243; price_color_type=&#8221;uncode-palette&#8221; price_color_solid=&#8221;#ff0000&#8243;][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/3&#8243; el_id=&#8221;prix&#8221;][uncode_pricing title=&#8221;INFRASTRUCTURE SECURITY AUDIT|Purple team&#8221; price=&#8221;1800\u20ac|with CIAS label&#8221; price_color=&#8221;color-482803&#8243; most=&#8221;yes&#8221; body=&#8221;Penetration testing|on your network from the internet<br \/>\nChecking your|configuration of your Firewall<br \/>\nSecurity analysis|mails, servers, storage, workstations, smartphones&#8230;<br \/>\nBackup prevention|verification of the recovery of your data<br \/>\nFull report&#8221; button=&#8221;url:https%3A%2F%2Fbecoms.tech%2Fen%2Fcontact-us%2F|title:Contact%20us&#8221; el_id=&#8221;#prix&#8221; uncode_shortcode_id=&#8221;328356&#8243; price_color_type=&#8221;uncode-palette&#8221; price_color_solid=&#8221;#ff0000&#8243;][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/3&#8243; el_id=&#8221;prix&#8221;][uncode_pricing title=&#8221;WEB SECURITY AUDIT|Blue team*&#8221; price=&#8221;2500\u20ac|with label included for 1 year&#8221; price_color=&#8221;color-210407&#8243; body=&#8221;Analyze and report|on the languages  used for the code<br \/>\nAudit|of code quality, maintainability and security<br \/>\nAssessment of the architecture in place|authentication and secure access, availability, backup, data protection&#8230;<br \/>\nPresentation of a full report| with screenshots and description of analyzes and tests&#8221; button=&#8221;url:https%3A%2F%2Fbecoms.tech%2Fen%2Fcontact-us%2F|title:Contact%20us&#8221; uncode_shortcode_id=&#8221;212497&#8243; price_color_type=&#8221;uncode-palette&#8221; price_color_solid=&#8221;#ff0000&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row row_height_percent=&#8221;70&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;5&#8243; bottom_padding=&#8221;5&#8243; back_color=&#8221;color-wayh&#8221; back_image=&#8221;84985&#8243; kburns=&#8221;yes&#8221; overlay_color=&#8221;color-wayh&#8221; overlay_alpha=&#8221;50&#8243; equal_height=&#8221;yes&#8221; gutter_size=&#8221;0&#8243; column_width_use_pixel=&#8221;yes&#8221; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; row_name=&#8221;Welcome&#8221;][vc_column column_width_use_pixel=&#8221;yes&#8221; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-86257","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Consulting &amp; Security &#8212; BECOMS<\/title>\n<meta name=\"description\" content=\"Becoms vous propose son expertise concernant vos projets informatique. Faites auditer votre syst\u00e8me informatique pour le s\u00e9curiser.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/becoms.tech\/en\/consulting-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Consulting &amp; Security &#8212; BECOMS\" \/>\n<meta property=\"og:description\" content=\"Becoms vous propose son expertise concernant vos projets informatique. Faites auditer votre syst\u00e8me informatique pour le s\u00e9curiser.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/becoms.tech\/en\/consulting-security\/\" \/>\n<meta property=\"og:site_name\" content=\"BECOMS\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-09T09:27:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/becoms.tech\/wp-content\/uploads\/2019\/12\/icon.png\" \/>\n\t<meta property=\"og:image:width\" content=\"387\" \/>\n\t<meta property=\"og:image:height\" content=\"387\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/becoms.tech\\\/en\\\/consulting-security\\\/\",\"url\":\"https:\\\/\\\/becoms.tech\\\/en\\\/consulting-security\\\/\",\"name\":\"Consulting & Security &#8212; BECOMS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/becoms.tech\\\/en\\\/#website\"},\"datePublished\":\"2022-05-06T09:04:36+00:00\",\"dateModified\":\"2022-05-09T09:27:01+00:00\",\"description\":\"Becoms vous propose son expertise concernant vos projets informatique. Faites auditer votre syst\u00e8me informatique pour le s\u00e9curiser.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/becoms.tech\\\/en\\\/consulting-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/becoms.tech\\\/en\\\/consulting-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/becoms.tech\\\/en\\\/consulting-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/becoms.tech\\\/en\\\/home-page\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Consulting &#038; Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/becoms.tech\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/becoms.tech\\\/en\\\/\",\"name\":\"BECOMS\",\"description\":\"Assembleur de technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/becoms.tech\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/becoms.tech\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/becoms.tech\\\/en\\\/#organization\",\"name\":\"BECOMS\",\"url\":\"https:\\\/\\\/becoms.tech\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/becoms.tech\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/becoms.tech\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/icon.png\",\"contentUrl\":\"https:\\\/\\\/becoms.tech\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/icon.png\",\"width\":387,\"height\":387,\"caption\":\"BECOMS\"},\"image\":{\"@id\":\"https:\\\/\\\/becoms.tech\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/oms-informatique\",\"https:\\\/\\\/www.youtube.com\\\/oms-actu\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Consulting & Security &#8212; BECOMS","description":"Becoms vous propose son expertise concernant vos projets informatique. Faites auditer votre syst\u00e8me informatique pour le s\u00e9curiser.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/becoms.tech\/en\/consulting-security\/","og_locale":"en_US","og_type":"article","og_title":"Consulting & Security &#8212; BECOMS","og_description":"Becoms vous propose son expertise concernant vos projets informatique. Faites auditer votre syst\u00e8me informatique pour le s\u00e9curiser.","og_url":"https:\/\/becoms.tech\/en\/consulting-security\/","og_site_name":"BECOMS","article_modified_time":"2022-05-09T09:27:01+00:00","og_image":[{"width":387,"height":387,"url":"https:\/\/becoms.tech\/wp-content\/uploads\/2019\/12\/icon.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/becoms.tech\/en\/consulting-security\/","url":"https:\/\/becoms.tech\/en\/consulting-security\/","name":"Consulting & Security &#8212; BECOMS","isPartOf":{"@id":"https:\/\/becoms.tech\/en\/#website"},"datePublished":"2022-05-06T09:04:36+00:00","dateModified":"2022-05-09T09:27:01+00:00","description":"Becoms vous propose son expertise concernant vos projets informatique. Faites auditer votre syst\u00e8me informatique pour le s\u00e9curiser.","breadcrumb":{"@id":"https:\/\/becoms.tech\/en\/consulting-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/becoms.tech\/en\/consulting-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/becoms.tech\/en\/consulting-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/becoms.tech\/en\/home-page\/"},{"@type":"ListItem","position":2,"name":"Consulting &#038; Security"}]},{"@type":"WebSite","@id":"https:\/\/becoms.tech\/en\/#website","url":"https:\/\/becoms.tech\/en\/","name":"BECOMS","description":"Assembleur de technologies","publisher":{"@id":"https:\/\/becoms.tech\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/becoms.tech\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/becoms.tech\/en\/#organization","name":"BECOMS","url":"https:\/\/becoms.tech\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/becoms.tech\/en\/#\/schema\/logo\/image\/","url":"https:\/\/becoms.tech\/wp-content\/uploads\/2019\/12\/icon.png","contentUrl":"https:\/\/becoms.tech\/wp-content\/uploads\/2019\/12\/icon.png","width":387,"height":387,"caption":"BECOMS"},"image":{"@id":"https:\/\/becoms.tech\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/oms-informatique","https:\/\/www.youtube.com\/oms-actu"]}]}},"_links":{"self":[{"href":"https:\/\/becoms.tech\/en\/wp-json\/wp\/v2\/pages\/86257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/becoms.tech\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/becoms.tech\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/becoms.tech\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/becoms.tech\/en\/wp-json\/wp\/v2\/comments?post=86257"}],"version-history":[{"count":5,"href":"https:\/\/becoms.tech\/en\/wp-json\/wp\/v2\/pages\/86257\/revisions"}],"predecessor-version":[{"id":86341,"href":"https:\/\/becoms.tech\/en\/wp-json\/wp\/v2\/pages\/86257\/revisions\/86341"}],"wp:attachment":[{"href":"https:\/\/becoms.tech\/en\/wp-json\/wp\/v2\/media?parent=86257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}