{"id":1814,"date":"2021-04-07T20:03:54","date_gmt":"2021-04-07T20:03:54","guid":{"rendered":"https:\/\/acetechnology.com\/?page_id=1814"},"modified":"2021-05-21T21:06:34","modified_gmt":"2021-05-21T21:06:34","slug":"network-security","status":"publish","type":"page","link":"https:\/\/acetechnology.com\/fr\/network-security\/","title":{"rendered":"S\u00e9curit\u00e9 des r\u00e9seaux"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown vc_row-o-content-middle vc_row-flex\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: center; color: white; font-size: 18px; line-height: 2;\">Une analyse\/audit de s\u00e9curit\u00e9 complet de l'\u00e9tat actuel de votre r\u00e9seau permet \u00e0 notre \u00e9quipe de recommander des mesures de s\u00e9curit\u00e9 tr\u00e8s efficaces bas\u00e9es sur nos solutions de pare-feu, de DMZ et de r\u00e9seau priv\u00e9 virtuel (VPN) : toutes \u00e9prouv\u00e9es, test\u00e9es et configurer efficacement.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><!-- Row Backgrounds --><div class=\"upb_color\" data-bg-override=\"0\" data-bg-color=\"#1e73be\" data-fadeout=\"\" data-fadeout-percentage=\"30\" data-parallax-content=\"\" data-parallax-content-sense=\"30\" data-row-effect-mobile-disable=\"true\" data-img-parallax-mobile-disable=\"true\" data-rtl=\"false\"  data-custom-vc-row=\"\"  data-vc=\"7.9\"  data-is_old_vc=\"\"  data-theme-support=\"\"   data-overlay=\"false\" data-overlay-color=\"\" data-overlay-pattern=\"\" data-overlay-pattern-opacity=\"\" data-overlay-pattern-size=\"\"    ><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h1 style=\"color: black; text-align: left; font-size: 40px;\">\u00c9valuation de la s\u00e9curit\u00e9<\/h1>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_row-o-equal-height vc_row-flex\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"color: #454545; font-size: 18px; line-height: 2; text-align: left;\">Les menaces et les attaques de s\u00e9curit\u00e9 sont synonymes de temps d'arr\u00eat et de d\u00e9penses ind\u00e9sirables pour votre organisation. Se tenir au courant des derni\u00e8res vuln\u00e9rabilit\u00e9s demande du temps et des efforts de votre part et de celle de votre personnel. C'est l\u00e0 qu'Ace Technology intervient ; notre \u00e9valuation de la s\u00e9curit\u00e9 vous fournira les informations n\u00e9cessaires pour prot\u00e9ger efficacement votre personnel, vos biens et votre r\u00e9putation.<br \/>\nL'\u00e9valuation de la s\u00e9curit\u00e9 d'Ace Technology se concentre sur 3 domaines majeurs :<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_animate_when_almost_visible wpb_fadeInRight fadeInRight wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"smile_icon_list_wrap ult_info_list_container ult-adjust-bottom-margin\"><ul class=\"smile_icon_list left circle with_bg\"><li class=\"icon_list_item\" style=\" font-size:60px;\"><div class=\"icon_list_icon\" data-animation=\"\" data-animation-delay=\"03\" style=\"font-size:20px;border-width:1px;border-style:none;background:#1e73be;color:#ffffff;border-color:#333333;\"><i class=\"Defaults-chevron-right\" ><\/i><\/div><div class=\"icon_description\" id=\"Info-list-wrap-1991\" style=\"font-size:20px;\"><div class=\"icon_description_text ult-responsive\"  data-ultimate-target='#Info-list-wrap-1991 .icon_description_text'  data-responsive-json-new='{\"font-size\":\"desktop:14px;\",\"line-height\":\"desktop:18px;\"}'  style=\"\"><h3 class=\"custom-bullet-title\" style=\"color: #454545; text-align: left;\">D\u00e9couverte<\/h3>\n<p style=\"text-align: left; color: #555555;\">Cartographie et d\u00e9couverte du r\u00e9seau des deux c\u00f4t\u00e9s du pare-feu, y compris les plages IP, les ports, les services, la topologie, etc.<\/p>\n<\/div><\/div><div class=\"icon_list_connector\"  style=\"border: none !important;\"><\/div><\/li><li class=\"icon_list_item\" style=\" font-size:60px;\"><div class=\"icon_list_icon\" data-animation=\"\" data-animation-delay=\"03\" style=\"font-size:20px;border-width:1px;border-style:none;background:#1e73be;color:#ffffff;border-color:#333333;\"><i class=\"Defaults-chevron-right\" ><\/i><\/div><div class=\"icon_description\" id=\"Info-list-wrap-7430\" style=\"font-size:20px;\"><div class=\"icon_description_text ult-responsive\"  data-ultimate-target='#Info-list-wrap-7430 .icon_description_text'  data-responsive-json-new='{\"font-size\":\"desktop:14px;\",\"line-height\":\"desktop:18px;\"}'  style=\"\"><h3 class=\"custom-bullet-title\" style=\"color: #454545; text-align: left;\">Tests d'intrusion externe et interne<\/h3>\n<p style=\"text-align: left; color: #555555;\">Par le biais du piratage \u00e9thique, nous tentons de compromettre la s\u00e9curit\u00e9 du r\u00e9seau et de p\u00e9n\u00e9trer aussi loin que possible pour identifier votre v\u00e9ritable posture de s\u00e9curit\u00e9.<\/p>\n<\/div><\/div><div class=\"icon_list_connector\"  style=\"border: none !important;\"><\/div><\/li><li class=\"icon_list_item\" style=\" font-size:60px;\"><div class=\"icon_list_icon\" data-animation=\"\" data-animation-delay=\"03\" style=\"font-size:20px;border-width:1px;border-style:none;background:#1e73be;color:#ffffff;border-color:#333333;\"><i class=\"Defaults-chevron-right\" ><\/i><\/div><div class=\"icon_description\" id=\"Info-list-wrap-2690\" style=\"font-size:20px;\"><div class=\"icon_description_text ult-responsive\"  data-ultimate-target='#Info-list-wrap-2690 .icon_description_text'  data-responsive-json-new='{\"font-size\":\"desktop:14px;\",\"line-height\":\"desktop:18px;\"}'  style=\"\"><h3 class=\"custom-bullet-title\" style=\"color: #454545; text-align: left;\">Documentation<\/h3>\n<p style=\"text-align: left; color: #555555;\">Nos rapports comprennent un r\u00e9sum\u00e9, un rapport de proc\u00e9dure, ainsi qu'une liste de contr\u00f4le des meilleures pratiques informatiques.<\/p>\n<\/div><\/div><div class=\"icon_list_connector\"  style=\"border: none !important;\"><\/div><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p class=\"card-text\"> [&#8230;]<\/p>\n<p class=\"m-0\"><a class=\"btn btn-outline-secondary btn-read-more\" href=\"https:\/\/acetechnology.com\/fr\/network-security\/\">Read More<\/a><\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1814","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Network Security | Ace Technology Inc.<\/title>\n<meta name=\"description\" content=\"Security threats and attacks mean downtime and unwanted expense for your organization. Keeping up with the latest vulnerabilities requires time and effort on behalf of you and your staff.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acetechnology.com\/fr\/network-security\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Security | Ace Technology Inc.\" \/>\n<meta property=\"og:description\" content=\"Security threats and attacks mean downtime and unwanted expense for your organization. Keeping up with the latest vulnerabilities requires time and effort on behalf of you and your staff.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acetechnology.com\/fr\/network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Ace Technology Inc.\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-21T21:06:34+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/acetechnology.com\/network-security\/\",\"url\":\"https:\/\/acetechnology.com\/network-security\/\",\"name\":\"Network Security | Ace Technology Inc.\",\"isPartOf\":{\"@id\":\"https:\/\/acetechnology.com\/fr\/#website\"},\"datePublished\":\"2021-04-07T20:03:54+00:00\",\"dateModified\":\"2021-05-21T21:06:34+00:00\",\"description\":\"Security threats and attacks mean downtime and unwanted expense for your organization. Keeping up with the latest vulnerabilities requires time and effort on behalf of you and your staff.\",\"breadcrumb\":{\"@id\":\"https:\/\/acetechnology.com\/network-security\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/acetechnology.com\/network-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/acetechnology.com\/network-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/acetechnology.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/acetechnology.com\/fr\/#website\",\"url\":\"https:\/\/acetechnology.com\/fr\/\",\"name\":\"Ace Technology Inc.\",\"description\":\"Enterprise Network Solutions, Services and Telecommunications\",\"publisher\":{\"@id\":\"https:\/\/acetechnology.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/acetechnology.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/acetechnology.com\/fr\/#organization\",\"name\":\"Ace Technology Inc.\",\"url\":\"https:\/\/acetechnology.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/acetechnology.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/acetechnology.com\/wp-content\/uploads\/2021\/03\/AceTechnology_Logo2_80px.png\",\"contentUrl\":\"https:\/\/acetechnology.com\/wp-content\/uploads\/2021\/03\/AceTechnology_Logo2_80px.png\",\"width\":218,\"height\":80,\"caption\":\"Ace Technology Inc.\"},\"image\":{\"@id\":\"https:\/\/acetechnology.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/ca.linkedin.com\/company\/ace-technology-inc-\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Security | Ace Technology Inc.","description":"Security threats and attacks mean downtime and unwanted expense for your organization. Keeping up with the latest vulnerabilities requires time and effort on behalf of you and your staff.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acetechnology.com\/fr\/network-security\/","og_locale":"fr_CA","og_type":"article","og_title":"Network Security | Ace Technology Inc.","og_description":"Security threats and attacks mean downtime and unwanted expense for your organization. Keeping up with the latest vulnerabilities requires time and effort on behalf of you and your staff.","og_url":"https:\/\/acetechnology.com\/fr\/network-security\/","og_site_name":"Ace Technology Inc.","article_modified_time":"2021-05-21T21:06:34+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acetechnology.com\/network-security\/","url":"https:\/\/acetechnology.com\/network-security\/","name":"Network Security | Ace Technology Inc.","isPartOf":{"@id":"https:\/\/acetechnology.com\/fr\/#website"},"datePublished":"2021-04-07T20:03:54+00:00","dateModified":"2021-05-21T21:06:34+00:00","description":"Security threats and attacks mean downtime and unwanted expense for your organization. Keeping up with the latest vulnerabilities requires time and effort on behalf of you and your staff.","breadcrumb":{"@id":"https:\/\/acetechnology.com\/network-security\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acetechnology.com\/network-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/acetechnology.com\/network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/acetechnology.com\/en\/"},{"@type":"ListItem","position":2,"name":"Network Security"}]},{"@type":"WebSite","@id":"https:\/\/acetechnology.com\/fr\/#website","url":"https:\/\/acetechnology.com\/fr\/","name":"Ace Technology Inc.","description":"Enterprise Network Solutions, Services and Telecommunications","publisher":{"@id":"https:\/\/acetechnology.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acetechnology.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/acetechnology.com\/fr\/#organization","name":"Ace Technology Inc.","url":"https:\/\/acetechnology.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/acetechnology.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/acetechnology.com\/wp-content\/uploads\/2021\/03\/AceTechnology_Logo2_80px.png","contentUrl":"https:\/\/acetechnology.com\/wp-content\/uploads\/2021\/03\/AceTechnology_Logo2_80px.png","width":218,"height":80,"caption":"Ace Technology Inc."},"image":{"@id":"https:\/\/acetechnology.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/ca.linkedin.com\/company\/ace-technology-inc-"]}]}},"_links":{"self":[{"href":"https:\/\/acetechnology.com\/fr\/wp-json\/wp\/v2\/pages\/1814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acetechnology.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/acetechnology.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/acetechnology.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/acetechnology.com\/fr\/wp-json\/wp\/v2\/comments?post=1814"}],"version-history":[{"count":20,"href":"https:\/\/acetechnology.com\/fr\/wp-json\/wp\/v2\/pages\/1814\/revisions"}],"predecessor-version":[{"id":3399,"href":"https:\/\/acetechnology.com\/fr\/wp-json\/wp\/v2\/pages\/1814\/revisions\/3399"}],"wp:attachment":[{"href":"https:\/\/acetechnology.com\/fr\/wp-json\/wp\/v2\/media?parent=1814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}