{"id":163,"date":"2025-11-17T15:55:54","date_gmt":"2025-11-17T15:55:54","guid":{"rendered":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/?page_id=163"},"modified":"2026-03-23T18:05:42","modified_gmt":"2026-03-23T18:05:42","slug":"services","status":"publish","type":"page","link":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/services\/","title":{"rendered":"Service g\u00e9r\u00e9s 360"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"163\" class=\"elementor elementor-163\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fba7e22 e-flex e-con-boxed e-con e-parent\" data-id=\"fba7e22\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f82c538 e-con-full e-flex e-con e-child\" data-id=\"f82c538\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd683c5 elementor-widget elementor-widget-spacer\" data-id=\"dd683c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c74381c elementor-widget elementor-widget-heading\" data-id=\"c74381c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Notre services g\u00e9r\u00e9s 360<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-729950c elementor-widget elementor-widget-heading\" data-id=\"729950c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">En quoi consistent les services g\u00e9r\u00e9s\u202f informatique<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bff72f4 elementor-widget elementor-widget-text-editor\" data-id=\"bff72f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Nos <strong>services g\u00e9r\u00e9s 360<\/strong> offrent aux entreprises une prise en charge compl\u00e8te et proactive de leur environnement technologique. En agissant comme un v\u00e9ritable d\u00e9partement TI externalis\u00e9, nous assurons la gestion quotidienne de vos syst\u00e8mes, \u00e0 distance ou sur place, selon vos besoins.<\/span><\/p><p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Cette solution inclut l\u2019ensemble de nos services sans limitation, pour un tarif mensuel fixe et avantageux. Une <\/span><strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">gouvernance TI<\/span><\/strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\"> rigoureuse est int\u00e9gr\u00e9e \u00e0 notre approche afin d\u2019assurer la conformit\u00e9, la performance et la continuit\u00e9 des op\u00e9rations.<\/span> <span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Cette solution est propos\u00e9e par usager et mis a l\u2019\u00e9chelle en fonction de votre nombre d\u2019usager.<\/span><\/p><p class=\"cvGsUA direction-ltr align-start para-style-body\"><strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Cette solution est bas\u00e9 sur les services suivant :<\/span><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21ac872 elementor-widget elementor-widget-spacer\" data-id=\"21ac872\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-65d1147 e-con-full e-grid e-con e-child\" data-id=\"65d1147\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9767ad5 elementor-align-center elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"9767ad5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#gestion\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Gestion administrative<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd188b2 elementor-align-center elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"cd188b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#support\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Support Technique<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf6492f elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"bf6492f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#cyber\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cybers\u00e9curit\u00e9<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b538b1c elementor-widget elementor-widget-spacer\" data-id=\"b538b1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0685c90 e-con-full e-flex e-con e-child\" data-id=\"0685c90\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-44e9eb9 elementor-widget elementor-widget-html\" data-id=\"44e9eb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<iframe src=\"https:\/\/aurora-orb-viz.lovable.app\" width=\"100%\" height=\"1200px\" style=\"border:none;\" loading=\"lazy\" allowfullscreen><\/iframe>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-489f518 e-flex e-con-boxed e-con e-parent\" data-id=\"489f518\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b6289fb e-con-full e-flex e-con e-child\" data-id=\"b6289fb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-856b590 elementor-widget elementor-widget-spacer\" data-id=\"856b590\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12d2de1 elementor-widget__width-initial elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget-mobile__width-inherit elementor-widget elementor-widget-divider\" data-id=\"12d2de1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\tGestion administrative\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf85c39 elementor-widget elementor-widget-menu-anchor\" data-id=\"cf85c39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"gestion\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de36b10 elementor-widget elementor-widget-heading\" data-id=\"de36b10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">La gestion administrative constitue un volet cl\u00e9 de notre service g\u00e9r\u00e9.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0414510 elementor-widget elementor-widget-text-editor\" data-id=\"0414510\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Le tout en assurant le bon d\u00e9roulement des processus internes, la conformit\u00e9 aux normes en vigueur, la coordination avec vos partenaires ainsi que l\u2019accompagnement de vos \u00e9quipes pour renforcer la s\u00e9curit\u00e9 et l\u2019efficacit\u00e9 de vos op\u00e9rations quotidiennes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-256373e elementor-widget elementor-widget-heading\" data-id=\"256373e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">GESTION ADMINISTRATIVE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13b5b9a elementor-widget elementor-widget-text-editor\" data-id=\"13b5b9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>Gestion des imprimantes<\/li><li>Gestion des processus onboarding\/offboarding<\/li><li>Signature personnalis\u00e9e<\/li><li>Rapport et statistique (billet, appels de service, etc)<\/li><li>Gestion des partenariats et des communication TI<\/li><li>Gestion des conformit\u00e9 (vigie TI, Loi 25)<\/li><li>Formation en ligne lors d&rsquo;\u00e9chec a des simulation d&rsquo;hame\u00e7onnage<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8441a52 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-n-accordion\" data-id=\"8441a52\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1380\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1380\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Gestion des imprimantes <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1380\" class=\"elementor-element elementor-element-34a602d e-con-full e-flex e-con e-child\" data-id=\"34a602d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89e382b elementor-widget elementor-widget-text-editor\" data-id=\"89e382b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">La gestion des imprimantes par un fournisseur de services g\u00e9r\u00e9s (MSP) consiste \u00e0 prendre en charge l\u2019ensemble du cycle de vie des \u00e9quipements d\u2019impression : de l\u2019installation \u00e0 la maintenance, en passant par la surveillance proactive et le d\u00e9pannage. Ce service assure une disponibilit\u00e9 constante, une configuration adapt\u00e9e aux besoins de l\u2019entreprise, et une s\u00e9curit\u00e9 renforc\u00e9e des impressions. Il permet \u00e9galement de centraliser les acc\u00e8s, d\u2019automatiser les mises \u00e0 jour, et d\u2019optimiser les co\u00fbts d\u2019exploitation. Int\u00e9gr\u00e9 aux autres services TI, il s\u2019inscrit dans une approche globale de performance et de continuit\u00e9 op\u00e9rationnelle.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1381\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1381\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Gestion des processus onboarding\/offboarding <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1381\" class=\"elementor-element elementor-element-2c30bca e-con-full e-flex e-con e-child\" data-id=\"2c30bca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66be2c0 elementor-widget elementor-widget-text-editor\" data-id=\"66be2c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Notre service g\u00e9r\u00e9 prend en charge l\u2019ensemble des \u00e9tapes li\u00e9es \u00e0 l\u2019arriv\u00e9e et au d\u00e9part des employ\u00e9s, assurant une transition sans friction et conforme aux meilleures pratiques TI. Lors de l\u2019onboarding, nous pr\u00e9parons les acc\u00e8s aux syst\u00e8mes, configurons les postes de travail, les imprimantes, les courriels et les outils collaboratifs, tout en appliquant les politiques de s\u00e9curit\u00e9. Lors de l\u2019offboarding, nous r\u00e9voquons les acc\u00e8s, archivons les donn\u00e9es pertinentes et assurons la d\u00e9sactivation compl\u00e8te des comptes. Ce service r\u00e9duit les risques li\u00e9s \u00e0 la s\u00e9curit\u00e9, am\u00e9liore l\u2019efficacit\u00e9 op\u00e9rationnelle et garantit une exp\u00e9rience professionnelle coh\u00e9rente pour chaque employ\u00e9.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1382\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1382\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Signature personnalis\u00e9e <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1382\" class=\"elementor-element elementor-element-b95cfb7 e-con-full e-flex e-con e-child\" data-id=\"b95cfb7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b30535d elementor-widget elementor-widget-text-editor\" data-id=\"b30535d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Le service de signature personnalis\u00e9e offert par SRG permet \u00e0 votre entreprise de standardiser les signatures courriel de tous les employ\u00e9s \u00e0 travers la plateforme Microsoft 365. Gr\u00e2ce \u00e0 des outils comme Letsignit, chaque utilisateur b\u00e9n\u00e9ficie d\u2019une signature professionnelle, coh\u00e9rente avec l\u2019image de marque de l\u2019organisation, incluant logo, coordonn\u00e9es, mentions l\u00e9gales et messages promotionnels. SRG prend en charge la configuration, la mise \u00e0 jour et le d\u00e9ploiement centralis\u00e9, assurant une gestion sans effort et une pr\u00e9sentation uniforme dans toutes les communications externes et internes.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1383\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1383\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Rapport et statistique (billet, appels de service, etc) <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1383\" class=\"elementor-element elementor-element-a378e27 e-con-full e-flex e-con e-child\" data-id=\"a378e27\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b414977 elementor-widget elementor-widget-text-editor\" data-id=\"b414977\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Le service Rapport et statistique propos\u00e9 par SRG vous donne acc\u00e8s \u00e0 une vue d\u2019ensemble claire et d\u00e9taill\u00e9e de vos activit\u00e9s TI. Il regroupe les donn\u00e9es li\u00e9es aux billets de support, aux appels de service, aux interventions techniques et aux demandes r\u00e9currentes. Gr\u00e2ce \u00e0 des tableaux de bord personnalis\u00e9s et des rapports p\u00e9riodiques, vous pouvez suivre les tendances, mesurer les performances, identifier les points de friction et prendre des d\u00e9cisions \u00e9clair\u00e9es. Ce service permet \u00e9galement de d\u00e9montrer la valeur des services g\u00e9r\u00e9s, d\u2019optimiser les ressources et d\u2019am\u00e9liorer la satisfaction des utilisateurs.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1384\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1384\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Gestion des partenariats et des communication TI <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1384\" class=\"elementor-element elementor-element-b34e5ad e-con-full e-flex e-con e-child\" data-id=\"b34e5ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a00d32a elementor-widget elementor-widget-text-editor\" data-id=\"a00d32a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">SRG assure une gestion compl\u00e8te du parc informatique de votre entreprise, incluant l\u2019inventaire des postes de travail, portable, ainsi que le suivi des garanties associ\u00e9es. Ce service permet de centraliser les informations mat\u00e9rielles, de conna\u00eetre l\u2019\u00e9tat et la localisation de chaque appareil, et de suivre les dates d\u2019expiration des garanties pour planifier les renouvellements ou les interventions. Gr\u00e2ce \u00e0 une base de donn\u00e9es \u00e0 jour et des outils de gestion automatis\u00e9s, SRG vous aide \u00e0 r\u00e9duire les risques li\u00e9s aux pannes, \u00e0 optimiser les investissements TI et \u00e0 maintenir la conformit\u00e9 op\u00e9rationnelle.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1385\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1385\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Gestion des conformit\u00e9 (vigie TI, Loi 25) <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1385\" class=\"elementor-element elementor-element-d426f88 e-con-full e-flex e-con e-child\" data-id=\"d426f88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9200e59 elementor-widget elementor-widget-text-editor\" data-id=\"9200e59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">SRG vous accompagne dans la gestion des conformit\u00e9s TI, en assurant une vigie constante sur les pratiques, les syst\u00e8mes et les processus li\u00e9s \u00e0 la s\u00e9curit\u00e9 et \u00e0 la protection des donn\u00e9es. Ce service inclut le suivi des exigences r\u00e9glementaires, notamment celles de la Loi 25, et la mise en place de mesures pour garantir la conformit\u00e9 aux normes en vigueur. SRG veille \u00e0 ce que vos environnements technologiques soient align\u00e9s avec les obligations l\u00e9gales, tout en vous fournissant des recommandations, des rapports et des ajustements proactifs pour r\u00e9duire les risques et renforcer la gouvernance TI.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1386\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1386\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Formation en ligne lors d'\u00e9chec a des simulation d'hame\u00e7onnage <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1386\" class=\"elementor-element elementor-element-147d41b e-con-full e-flex e-con e-child\" data-id=\"147d41b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-09003ae elementor-widget elementor-widget-text-editor\" data-id=\"09003ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Dans le cadre de sa strat\u00e9gie de cybers\u00e9curit\u00e9, SRG propose un service de formation automatis\u00e9e destin\u00e9 aux employ\u00e9s qui \u00e9chouent aux simulations d\u2019hame\u00e7onnage. Lorsqu\u2019un utilisateur clique sur un lien frauduleux simul\u00e9, il est automatiquement redirig\u00e9 vers une capsule de formation en ligne adapt\u00e9e \u00e0 la situation. Cette approche permet de renforcer les r\u00e9flexes de vigilance, de sensibiliser aux techniques de fraude courantes et de r\u00e9duire les risques humains li\u00e9s \u00e0 la s\u00e9curit\u00e9 informatique. Le contenu est simple, interactif et con\u00e7u pour am\u00e9liorer la posture de s\u00e9curit\u00e9 de l\u2019organisation de mani\u00e8re continue.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7113f11 elementor-widget elementor-widget-spacer\" data-id=\"7113f11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-78d54e9 e-flex e-con-boxed e-con e-parent\" data-id=\"78d54e9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a77173 elementor-widget elementor-widget-spacer\" data-id=\"5a77173\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cdad660 elementor-widget__width-initial elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget-mobile__width-inherit elementor-widget elementor-widget-divider\" data-id=\"cdad660\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\tSupport technique\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2962cae elementor-widget elementor-widget-menu-anchor\" data-id=\"2962cae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"support\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ba2b71 elementor-widget elementor-widget-heading\" data-id=\"6ba2b71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Le support technique assure une assistance rapide et proactive pour maintenir la performance et la s\u00e9curit\u00e9 de votre infrastructure. \n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55480c4 elementor-widget elementor-widget-text-editor\" data-id=\"55480c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Gr\u00e2ce \u00e0 une surveillance continue, des interventions \u00e0 distance ou sur site, et un service d\u2019urgence 24\/7, vous b\u00e9n\u00e9ficiez d\u2019un soutien fiable et accessible qui vous permet de rester concentr\u00e9 sur votre activit\u00e9 sans interruption.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb16ac8 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"eb16ac8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Support technique illimit\u00e9 entre 8h00 et 17h00 du lundi au vendredi<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72dd232 elementor-widget elementor-widget-spacer\" data-id=\"72dd232\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6224095 e-grid e-con-boxed e-con e-child\" data-id=\"6224095\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b00ed2f elementor-widget elementor-widget-heading\" data-id=\"b00ed2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SUPPORT ANTICIP\u00c9<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a7caa9 elementor-widget elementor-widget-heading\" data-id=\"2a7caa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SUPPORT SUR DEMANDE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2fc39c elementor-widget elementor-widget-text-editor\" data-id=\"f2fc39c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Gestion des mises \u00e0 jours<\/p><p>Surveillance pr\u00e9ventive des performance et composante des ordinateurs<\/p><p>Sauvegarde quotidienne de tout les documents infonuagique (M365)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d3e773 elementor-widget elementor-widget-text-editor\" data-id=\"7d3e773\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Acc\u00e8s \u00e0 distance en un clic<\/span><\/p><p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Acc\u00e8s au service d&rsquo;urgence 24\/7<\/span><\/p><p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Acc\u00e8s \u00e0 des visites technique sur place<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fce3e0 elementor-widget elementor-widget-spacer\" data-id=\"4fce3e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d370af0 e-flex e-con-boxed e-con e-parent\" data-id=\"d370af0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1fde085 e-con-full e-flex e-con e-child\" data-id=\"1fde085\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cbb2d30 elementor-widget elementor-widget-spacer\" data-id=\"cbb2d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43976b1 elementor-widget__width-initial elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget-mobile__width-inherit elementor-widget elementor-widget-divider\" data-id=\"43976b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\tCybers\u00e9curit\u00e9\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cafc0d5 elementor-widget elementor-widget-menu-anchor\" data-id=\"cafc0d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"cyber\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f96d013 elementor-widget elementor-widget-heading\" data-id=\"f96d013\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">La cybers\u00e9curit\u00e9 vise \u00e0 prot\u00e9ger votre organisation contre les menaces num\u00e9riques.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92ff955 elementor-widget elementor-widget-text-editor\" data-id=\"92ff955\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Comment ? En assurant une surveillance constante, une d\u00e9tection rapide et une r\u00e9ponse imm\u00e9diate aux incidents. Gr\u00e2ce \u00e0 une gestion proactive et \u00e0 des outils avanc\u00e9s, nous analysons, neutralisons et pr\u00e9venons les risques avant qu\u2019ils ne compromettent vos donn\u00e9es ou vos op\u00e9rations.<\/span><\/p><p class=\"cvGsUA direction-ltr align-start para-style-body\"><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Cette approche globale permet de s\u00e9curiser vos syst\u00e8mes, vos communications et vos environnements cloud, tout en vous offrant la tranquillit\u00e9 d\u2019esprit de savoir que votre protection est active 24\/7.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c36873f elementor-widget elementor-widget-heading\" data-id=\"c36873f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SECUR+ (CYBERS\u00c9CURIT\u00c9)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f544269 elementor-widget elementor-widget-text-editor\" data-id=\"f544269\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>D\u00e9tection et r\u00e9ponse des points de terminaison<\/li><li>D\u00e9tection et r\u00e9ponse g\u00e9r\u00e9es par M365 ou Google Workspace<\/li><li>Perturbation des menaces et confinement actif<\/li><li><div class=\"e-n-accordion-item-title-text\">SOC et chasse aux menaces 24h\/24 et 7j\/7<\/div><\/li><li>Gestion des vuln\u00e9rabilit\u00e9s<\/li><li>Analyse des e-mails suspects<\/li><li>Surveillance des menaces externes<\/li><li>Conservation des journaux &#8211; 90 jours<\/li><li>D\u00e9tection et r\u00e9ponse du r\u00e9seau &#8211; G\u00e9r\u00e9<\/li><li>Surveillance du dark web<\/li><li>Analyse des menaces am\u00e9lior\u00e9e<\/li><li>Pare-feu DNS itin\u00e9rant<\/li><li><div class=\"e-n-accordion-item-title-text\">Antispam<\/div><\/li><li>Simulation d\u2019hame\u00e7onnage<\/li><li>SRG int\u00e8gre une solution SIEM<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cca2ca1 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-n-accordion\" data-id=\"cca2ca1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2140\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-2140\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> D\u00e9tection et r\u00e9ponse des points de terminaison <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2140\" class=\"elementor-element elementor-element-5f35f87 e-con-full e-flex e-con e-child\" data-id=\"5f35f87\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1267130 elementor-widget elementor-widget-text-editor\" data-id=\"1267130\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">SRG propose une solution MEDR compl\u00e8te qui combine la d\u00e9tection et la r\u00e9ponse sur les points de terminaison \u00e0 une surveillance continue, 24 heures sur 24, 7 jours sur 7. Cette approche proactive s\u2019appuie sur des outils avanc\u00e9s capables d\u2019identifier en temps r\u00e9el les menaces, qu\u2019il s\u2019agisse de malwares, de ransomwares, d\u2019attaques de type zero-day ou de comportements suspects au sein des syst\u00e8mes et applications de l\u2019organisation. D\u00e8s qu\u2019une activit\u00e9 inhabituelle est d\u00e9tect\u00e9e sur un poste de travail ou un appareil connect\u00e9 au r\u00e9seau, la plateforme MEDR d\u00e9clenche une alerte transmise directement \u00e0 l\u2019\u00e9quipe de s\u00e9curit\u00e9 de SRG. Les experts analysent alors l\u2019\u00e9v\u00e9nement, en \u00e9valuent le niveau de criticit\u00e9 et mettent en \u0153uvre, si n\u00e9cessaire, des mesures de confinement imm\u00e9diates\u202f: isolement du poste compromis, blocage de processus malveillants, suspension d\u2019acc\u00e8s \u00e0 certains services ou r\u00e9seaux. Au-del\u00e0 de la r\u00e9ponse automatis\u00e9e, la solution MEDR de SRG inclut un accompagnement humain avec des analystes chevronn\u00e9s qui assurent le suivi de chaque incident. Ces sp\u00e9cialistes prennent en charge l\u2019investigation approfondie des causes, la documentation des actions r\u00e9alis\u00e9es, la communication transparente avec les responsables TI de l\u2019organisation ainsi que la coordination des \u00e9tapes de rem\u00e9diation. SRG assure \u00e9galement la mise \u00e0 jour continue des bases de menaces gr\u00e2ce \u00e0 l\u2019int\u00e9gration de renseignements issus de sources mondiales, permettant ainsi d\u2019anticiper et de contrer les tactiques les plus r\u00e9centes employ\u00e9es par les cybercriminels. L\u2019ensemble des interventions est consign\u00e9 dans des rapports d\u00e9taill\u00e9s, assurant la tra\u00e7abilit\u00e9, la conformit\u00e9 aux normes de l\u2019industrie et la visibilit\u00e9 sur l\u2019\u00e9volution des incidents. Finalement, la solution MEDR propos\u00e9e par SRG vise non seulement \u00e0 neutraliser rapidement les attaques, mais aussi \u00e0 renforcer la posture de s\u00e9curit\u00e9 de l\u2019organisation \u00e0 long terme, gr\u00e2ce \u00e0 des recommandations personnalis\u00e9es et un accompagnement sur mesure pour adapter les strat\u00e9gies de d\u00e9fense aux besoins r\u00e9els du client.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2141\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2141\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> D\u00e9tection et r\u00e9ponse g\u00e9r\u00e9es par M365 ou Google Workspace <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2141\" class=\"elementor-element elementor-element-78e7b5b e-con-full e-flex e-con e-child\" data-id=\"78e7b5b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b4df876 elementor-widget elementor-widget-text-editor\" data-id=\"b4df876\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">SRG s\u00e9curise vos environnements Microsoft 365 et Google Workspace gr\u00e2ce \u00e0 un service MDR g\u00e9r\u00e9 qui allie surveillance avanc\u00e9e, d\u00e9tection proactive et intervention sp\u00e9cialis\u00e9e. Nos \u00e9quipes assurent la veille continue sur tous les points de terminaison, d\u00e9tectant en temps r\u00e9el les tentatives d\u2019acc\u00e8s non autoris\u00e9s ou les comportements suspects dans vos plateformes collaboratives. Lorsqu\u2019une menace ou une anomalie est d\u00e9tect\u00e9e, SRG mobilise ses experts pour une analyse rapide de l\u2019incident, suivie d\u2019une r\u00e9ponse imm\u00e9diate\u202f: isolation des comptes compromis, suspension temporaire des acc\u00e8s vuln\u00e9rables, et application de mesures correctives pour limiter tout impact. En parall\u00e8le, un rapport d\u00e9taill\u00e9 des activit\u00e9s et des menaces intercept\u00e9es est g\u00e9n\u00e9r\u00e9, permettant \u00e0 vos \u00e9quipes TI de suivre la situation et d\u2019ajuster les politiques de s\u00e9curit\u00e9. Gr\u00e2ce \u00e0 la gestion centralis\u00e9e, \u00e0 l\u2019int\u00e9gration avec les outils natifs de Microsoft 365 et de Google Workspace, et \u00e0 la coordination avec les protocoles internes, SRG optimise la protection de vos informations et garantit la continuit\u00e9 de vos op\u00e9rations, m\u00eame face aux attaques les plus sophistiqu\u00e9es.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2142\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2142\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Perturbation des menaces et confinement actif <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2142\" class=\"elementor-element elementor-element-9ec33b3 e-con-full e-flex e-con e-child\" data-id=\"9ec33b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1fbb6e8 elementor-widget elementor-widget-text-editor\" data-id=\"1fbb6e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">SRG intervient rapidement pour perturber et contenir les menaces d\u00e8s leur d\u00e9tection. Nos \u00e9quipes techniques assurent un confinement actif afin d\u2019\u00e9viter toute propagation dans votre infrastructure. Lorsqu\u2019un incident est identifi\u00e9, une analyse approfondie est men\u00e9e pour d\u00e9terminer la nature de la menace, son vecteur d\u2019attaque et ses \u00e9ventuels impacts sur vos op\u00e9rations. En fonction du sc\u00e9nario, SRG peut isoler les postes infect\u00e9s, suspendre temporairement certains acc\u00e8s ou appliquer des r\u00e8gles de filtrage en temps r\u00e9el afin de limiter l\u2019expansion de l\u2019incident. Un protocole d\u2019intervention structur\u00e9 guide chaque action\u202f: communication imm\u00e9diate avec les responsables TI, documentation des \u00e9tapes r\u00e9alis\u00e9es, recommandations de mesures compl\u00e9mentaires et suivi jusqu\u2019\u00e0 la r\u00e9solution compl\u00e8te. Cette approche permet de r\u00e9duire la fen\u00eatre d\u2019exposition, de restaurer la confiance et de minimiser l\u2019impact sur vos activit\u00e9s critiques, tout en assurant une tra\u00e7abilit\u00e9 et une conformit\u00e9 aux exigences r\u00e9glementaires.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2143\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2143\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> SOC et chasse aux menaces 24h\/24 et 7j\/7 <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2143\" class=\"elementor-element elementor-element-eab6473 e-con-full e-flex e-con e-child\" data-id=\"eab6473\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6054e33 elementor-widget elementor-widget-text-editor\" data-id=\"6054e33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Le centre op\u00e9rationnel de s\u00e9curit\u00e9 (SOC) de SRG est dot\u00e9 d\u2019une \u00e9quipe d\u2019experts d\u00e9di\u00e9e qui surveille en temps r\u00e9el tous les flux et \u00e9v\u00e9nements de s\u00e9curit\u00e9 au sein de votre infrastructure. L\u2019activit\u00e9 de chasse aux menaces s\u2019appuie sur des outils avanc\u00e9s d\u2019analyse comportementale et d\u2019intelligence artificielle afin de d\u00e9tecter aussi bien les attaques connues que les comportements suspects qui pourraient indiquer une menace \u00e9mergente ou sophistiqu\u00e9e. La surveillance 24h\/24 et 7j\/7 permet d\u2019identifier proactivement toute activit\u00e9 anormale, qu\u2019il s\u2019agisse de tentatives d\u2019intrusion, de mouvements lat\u00e9raux, d\u2019exfiltration de donn\u00e9es ou d\u2019abus de privil\u00e8ges. Les incidents d\u00e9tect\u00e9s font l\u2019objet d\u2019une investigation approfondie : les experts analysent la source, l\u2019ampleur et le contexte de chaque alerte avant de recommander ou d\u2019appliquer des mesures de rem\u00e9diation imm\u00e9diate, telles que le confinement d\u2019un poste, la r\u00e9vocation d\u2019acc\u00e8s ou le durcissement des configurations. Le SOC de SRG int\u00e8gre \u00e9galement des flux de renseignement sur les menaces provenant de sources mondiales et locales, permettant une anticipation constante des nouvelles techniques d\u2019attaque. Toutes les interventions sont trac\u00e9es et document\u00e9es, assurant la conformit\u00e9 avec les exigences r\u00e9glementaires et offrant une visibilit\u00e9 compl\u00e8te sur la posture de s\u00e9curit\u00e9 de votre organisation. Gr\u00e2ce \u00e0 cette combinaison de vigilance humaine et d\u2019automatisation intelligente, SRG optimise la protection de vos actifs num\u00e9riques et accompagne votre \u00e9quipe technique au besoin dans la gestion des incidents et la pr\u00e9vention des cyber-risques.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2144\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2144\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Gestion des vuln\u00e9rabilit\u00e9s <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2144\" class=\"elementor-element elementor-element-21959ba e-con-full e-flex e-con e-child\" data-id=\"21959ba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8f8554 elementor-widget elementor-widget-text-editor\" data-id=\"b8f8554\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">SRG proc\u00e8de \u00e0 une \u00e9valuation m\u00e9thodique et r\u00e9guli\u00e8re de l\u2019ensemble des actifs num\u00e9riques, identifiant les vuln\u00e9rabilit\u00e9s par le biais de scans automatis\u00e9s, d\u2019analyses manuelles et de tests d\u2019intrusion cibl\u00e9s. Cette d\u00e9marche inclut l\u2019examen des logiciels obsol\u00e8tes, des correctifs manquants, des failles de configuration dans les syst\u00e8mes, ainsi que des acc\u00e8s injustifi\u00e9s ou des droits excessifs. Chaque faiblesse d\u00e9tect\u00e9e fait l\u2019objet d\u2019une priorisation bas\u00e9e sur le niveau de risque et l\u2019exposition r\u00e9elle, permettant d\u2019\u00e9laborer un plan de rem\u00e9diation sur mesure. Les experts SRG accompagnent les \u00e9quipes techniques tout au long du processus de correction, qu\u2019il s\u2019agisse de d\u00e9ployer des mises \u00e0 jour de s\u00e9curit\u00e9, de renforcer les politiques de mot de passe, de segmenter les r\u00e9seaux sensibles ou de mettre en place des contr\u00f4les d\u2019acc\u00e8s plus stricts. Un rapport d\u00e9taill\u00e9 est fourni \u00e0 chaque \u00e9tape, assurant la tra\u00e7abilit\u00e9 des interventions et la conformit\u00e9 avec les exigences r\u00e9glementaires. Gr\u00e2ce \u00e0 cette approche proactive, SRG contribue \u00e0 minimiser la surface d\u2019attaque, \u00e0 anticiper les \u00e9volutions des menaces et \u00e0 renforcer durablement la r\u00e9silience de votre organisation face aux cyber-risques.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2145\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2145\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Analyse des e-mails suspects <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2145\" class=\"elementor-element elementor-element-2db54dc e-con-full e-flex e-con e-child\" data-id=\"2db54dc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3711ebb elementor-widget elementor-widget-text-editor\" data-id=\"3711ebb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">SRG analyse les courriels douteux pour d\u00e9tecter les tentatives de phishing ou les malwares, assurant une protection renforc\u00e9e de vos communications \u00e9lectroniques.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2146\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2146\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Surveillance des menaces externes <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2146\" class=\"elementor-element elementor-element-4a4a2e9 e-con-full e-flex e-con e-child\" data-id=\"4a4a2e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ea8511 elementor-widget elementor-widget-text-editor\" data-id=\"8ea8511\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Pour renforcer la protection de vos actifs num\u00e9riques, SRG effectue une surveillance continue des services expos\u00e9s sur Internet, incluant les adresses IP publiques, les sous-domaines et l\u2019ensemble des ports accessibles. Cette veille proactive int\u00e8gre des scans r\u00e9guliers pour d\u00e9tecter les vuln\u00e9rabilit\u00e9s telles que les failles logicielles non corrig\u00e9es, les mauvaises configurations ou la pr\u00e9sence de services sensibles accessibles depuis l\u2019ext\u00e9rieur. Lorsqu\u2019une faiblesse est identifi\u00e9e, une alerte d\u00e9taill\u00e9e est g\u00e9n\u00e9r\u00e9e, permettant de r\u00e9agir rapidement par l\u2019isolation, la correction ou le durcissement de la configuration concern\u00e9e. Ce dispositif vise \u00e0 anticiper les tentatives d\u2019intrusion, pr\u00e9venir les expositions accidentelles de donn\u00e9es ou d\u2019acc\u00e8s critiques, et r\u00e9duire la surface d\u2019attaque globale de votre organisation.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2147\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"8\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2147\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Conservation des journaux - 90 jours <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2147\" class=\"elementor-element elementor-element-7798af9 e-con-full e-flex e-con e-child\" data-id=\"7798af9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f902930 elementor-widget elementor-widget-text-editor\" data-id=\"f902930\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">SRG conserve les journaux de s\u00e9curit\u00e9 pendant 90 jours, avec une option \u00e9tendue jusqu\u2019\u00e0 7 ans, r\u00e9pondant ainsi aux exigences r\u00e9glementaires et aux besoins d\u2019audit.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2148\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"9\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2148\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> D\u00e9tection et r\u00e9ponse du r\u00e9seau - G\u00e9r\u00e9 <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2148\" class=\"elementor-element elementor-element-822ac41 e-con-full e-flex e-con e-child\" data-id=\"822ac41\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f0f94fc elementor-widget elementor-widget-text-editor\" data-id=\"f0f94fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">SRG assure une surveillance r\u00e9seau g\u00e9r\u00e9e et approfondie en d\u00e9ployant des sondes IDS\/IPS (Intrusion Detection\/Prevention Systems) et des capteurs de trafic qui inspectent en temps r\u00e9el les paquets transitant sur l\u2019ensemble des segments critiques. Cette supervision repose sur l\u2019analyse comportementale, la d\u00e9tection d\u2019anomalies et la corr\u00e9lation automatique d\u2019\u00e9v\u00e9nements, permettant d\u2019identifier et de neutraliser les menaces avanc\u00e9es telles que les mouvements lat\u00e9raux, les communications command-and-control, et les exfiltrations de donn\u00e9es. Les alertes g\u00e9n\u00e9r\u00e9es sont enrichies via des flux de threat intelligence, facilitant le d\u00e9clenchement de r\u00e9ponses automatis\u00e9es comme l\u2019isolement dynamique d\u2019un poste ou la g\u00e9n\u00e9ration de r\u00e8gles de blocage temporaires sur les \u00e9quipements r\u00e9seau. Un tableau de bord centralis\u00e9 offre une visibilit\u00e9 compl\u00e8te sur les indicateurs de compromission, assurant un suivi en temps r\u00e9el de l\u2019\u00e9tat de s\u00e9curit\u00e9 du r\u00e9seau et une tra\u00e7abilit\u00e9 exhaustive des interventions effectu\u00e9es.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2149\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"10\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2149\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Surveillance du dark web <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2149\" class=\"elementor-element elementor-element-26c4469 e-con-full e-flex e-con e-child\" data-id=\"26c4469\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42bed2d elementor-widget elementor-widget-text-editor\" data-id=\"42bed2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">SRG effectue une surveillance proactive du dark web \u00e0 l\u2019aide de solutions OSINT (Open Source Intelligence) et de plateformes de threat intelligence avanc\u00e9es afin de d\u00e9tecter toute fuite de donn\u00e9es organisationnelles sensibles, telles que des identifiants d\u2019acc\u00e8s, des hashs de mots de passe, des tokens d\u2019authentification ou des artefacts de configuration expos\u00e9s. Cette veille continue inclut l\u2019analyse automatis\u00e9e de forums clandestins, de marketplaces illicites et de canaux de communication chiffr\u00e9s, permettant une remont\u00e9e rapide des incidents impliquant des donn\u00e9es compromises. Les alertes g\u00e9n\u00e9r\u00e9es sont corr\u00e9l\u00e9es avec les IOC (Indicateurs de Compromission) existants afin d\u2019enrichir la posture de cybers\u00e9curit\u00e9 et de d\u00e9clencher des mesures de mitigation cibl\u00e9es.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-21410\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"11\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-21410\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Analyse des menaces am\u00e9lior\u00e9e <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-21410\" class=\"elementor-element elementor-element-f921ead e-con-full e-flex e-con e-child\" data-id=\"f921ead\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a4a688 elementor-widget elementor-widget-text-editor\" data-id=\"4a4a688\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">SRG fournit une analyse avanc\u00e9e des menaces d\u00e9tect\u00e9es en s\u2019appuyant sur des m\u00e9canismes d\u2019intelligence artificielle et des moteurs de corr\u00e9lation multi-niveaux. Gr\u00e2ce \u00e0 l\u2019int\u00e9gration d\u2019indicateurs de compromission (IOC) issus de flux de renseignements globaux et \u00e0 l\u2019analyse comportementale automatis\u00e9e, les signaux faibles et les attaques sophistiqu\u00e9es sont identifi\u00e9s en amont. Les flux de donn\u00e9es r\u00e9seau, les journaux d\u2019\u00e9v\u00e9nements et les m\u00e9tadonn\u00e9es sont inspect\u00e9s via des algorithmes de d\u00e9tection d\u2019anomalies, facilitant la hi\u00e9rarchisation des alertes et la r\u00e9duction du bruit op\u00e9rationnel. L\u2019orchestration automatis\u00e9e d\u00e9clenche des r\u00e9ponses pr\u00e9d\u00e9finies ou adaptatives (conteneurisation des incidents, isolation des actifs vuln\u00e9rables, g\u00e9n\u00e9ration de tickets de rem\u00e9diation) afin d\u2019optimiser la r\u00e9silience de l\u2019organisation et d\u2019assurer une tra\u00e7abilit\u00e9 compl\u00e8te pour chaque incident de s\u00e9curit\u00e9.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-21411\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"12\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-21411\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Pare-feu DNS itin\u00e9rant <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-21411\" class=\"elementor-element elementor-element-b3f66da e-con-full e-flex e-con e-child\" data-id=\"b3f66da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f1c543f elementor-widget elementor-widget-text-editor\" data-id=\"f1c543f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">SRG propose un pare-feu DNS itin\u00e9rant qui s\u00e9curise les connexions des utilisateurs, m\u00eame hors du r\u00e9seau traditionnel. Il bloque les domaines malveillants et sites de phishing gr\u00e2ce \u00e0 l\u2019analyse en temps r\u00e9el des requ\u00eates DNS, des bases de menaces mises \u00e0 jour, et int\u00e8gre l\u2019inspection approfondie des paquets, des r\u00e8gles personnalis\u00e9es ainsi que le chiffrement DNS. La gestion centralis\u00e9e facilite la supervision et le suivi des acc\u00e8s refus\u00e9s, garantissant une protection efficace pour les environnements hybrides et mobiles.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-21412\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"13\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-21412\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Antispam <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-21412\" class=\"elementor-element elementor-element-df0cbe6 e-con-full e-flex e-con e-child\" data-id=\"df0cbe6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0801a91 elementor-widget elementor-widget-text-editor\" data-id=\"0801a91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Le service antispam de SRG repose sur une architecture multi-niveaux combinant des filtres heuristiques, bay\u00e9siens et des listes de r\u00e9putation pour analyser en temps r\u00e9el les courriels entrants. Gr\u00e2ce \u00e0 l\u2019int\u00e9gration des protocoles SPF, DKIM et DMARC, il v\u00e9rifie l\u2019authenticit\u00e9 des exp\u00e9diteurs et bloque les tentatives d\u2019usurpation. Le moteur d\u2019analyse s\u2019appuie \u00e9galement sur des indicateurs de compromission (IoC) et des flux OSINT pour d\u00e9tecter les campagnes malveillantes \u00e9mergentes. D\u00e9ploy\u00e9 en mode cloud ou sur site, le service est con\u00e7u pour s\u2019adapter dynamiquement aux nouvelles menaces gr\u00e2ce \u00e0 des algorithmes d\u2019apprentissage automatique, assurant ainsi une protection proactive et personnalis\u00e9e pour chaque environnement client.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-21413\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"14\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-21413\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Simulation d\u2019hame\u00e7onnage <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-21413\" class=\"elementor-element elementor-element-5722af1 e-con-full e-flex e-con e-child\" data-id=\"5722af1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-23004f6 elementor-widget elementor-widget-text-editor\" data-id=\"23004f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">SRG r\u00e9alise des campagnes de simulation d\u2019hame\u00e7onnage pour tester la vigilance de vos employ\u00e9s et renforcer leur formation en cybers\u00e9curit\u00e9. Ces simulations utilisent diff\u00e9rents vecteurs d\u2019attaque, tels que des courriels imitant des tentatives d\u2019hame\u00e7onnage cibl\u00e9 (spear phishing), des liens frauduleux ou des pi\u00e8ces jointes malveillantes. Les r\u00e9sultats d\u00e9taill\u00e9s incluent des statistiques sur les taux de clics, d\u2019ouverture et de signalement, permettant d\u2019identifier les vuln\u00e9rabilit\u00e9s humaines sp\u00e9cifiques et d\u2019adapter les modules de formation. Chaque simulation peut \u00eatre personnalis\u00e9e selon les profils de risque et les m\u00e9tiers, int\u00e9grant un retour automatis\u00e9 et des recommandations pour am\u00e9liorer la posture de s\u00e9curit\u00e9 de l\u2019organisation dans son ensemble.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-21414\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"15\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-21414\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> SRG int\u00e8gre une solution SIEM  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"icon icon-up-arrow1\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"icon icon-down-arrow1\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-21414\" class=\"elementor-element elementor-element-d3667d2 e-con-full e-flex e-con e-child\" data-id=\"d3667d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a973e1 elementor-widget elementor-widget-text-editor\" data-id=\"6a973e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Syst\u00e8me avanc\u00e9e qui centralise, collecte et corr\u00e8le en temps r\u00e9el les journaux d\u2019\u00e9v\u00e9nements provenant de l\u2019ensemble de vos syst\u00e8mes, applications, pare-feu et \u00e9quipements r\u00e9seau. Gr\u00e2ce \u00e0 des moteurs d\u2019analyse comportementale et \u00e0 l\u2019intelligence artificielle, le SIEM d\u00e9tecte les anomalies, identifie les incidents de s\u00e9curit\u00e9 potentiels et d\u00e9clenche des alertes automatis\u00e9es. Les tableaux de bord personnalisables offrent une visibilit\u00e9 compl\u00e8te et dynamique sur votre posture de s\u00e9curit\u00e9, permettant des investigations rapides et une r\u00e9ponse efficace aux menaces. De plus, le SIEM facilite la conformit\u00e9 r\u00e9glementaire en g\u00e9n\u00e9rant des rapports d\u00e9taill\u00e9s sur les acc\u00e8s, les tentatives d\u2019intrusion et les activit\u00e9s suspectes.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3e229f elementor-widget elementor-widget-heading\" data-id=\"c3e229f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SURVEILLANCE &amp; GESTION \u00c0 DISTANCE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3795c2 elementor-widget elementor-widget-text-editor\" data-id=\"d3795c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>Gestion des mises a jours automatis\u00e9<\/li><li>Surveillance \u00e0 distance rapide<\/li><li>Acc\u00e8s \u00e0 distance en un clic<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6007f4b elementor-widget elementor-widget-spacer\" data-id=\"6007f4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Notre services g\u00e9r\u00e9s 360 En quoi consistent les services g\u00e9r\u00e9s\u202f informatique Nos services g\u00e9r\u00e9s 360 offrent aux entreprises une prise en charge compl\u00e8te et proactive de leur environnement technologique. En agissant comme un v\u00e9ritable d\u00e9partement TI externalis\u00e9, nous assurons la gestion quotidienne de vos syst\u00e8mes, \u00e0 distance ou sur place, selon vos besoins. Cette solution [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-163","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Service g\u00e9r\u00e9s 360 - SRG NOUVEAU SITE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/services\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Service g\u00e9r\u00e9s 360 - SRG NOUVEAU SITE\" \/>\n<meta property=\"og:description\" content=\"Notre services g\u00e9r\u00e9s 360 En quoi consistent les services g\u00e9r\u00e9s\u202f informatique Nos services g\u00e9r\u00e9s 360 offrent aux entreprises une prise en charge compl\u00e8te et proactive de leur environnement technologique. En agissant comme un v\u00e9ritable d\u00e9partement TI externalis\u00e9, nous assurons la gestion quotidienne de vos syst\u00e8mes, \u00e0 distance ou sur place, selon vos besoins. Cette solution [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/services\/\" \/>\n<meta property=\"og:site_name\" content=\"SRG NOUVEAU SITE\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-23T18:05:42+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"30 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/services\/\",\"url\":\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/services\/\",\"name\":\"Service g\u00e9r\u00e9s 360 - SRG NOUVEAU SITE\",\"isPartOf\":{\"@id\":\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/#website\"},\"datePublished\":\"2025-11-17T15:55:54+00:00\",\"dateModified\":\"2026-03-23T18:05:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/services\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/services\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service g\u00e9r\u00e9s 360\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/#website\",\"url\":\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/\",\"name\":\"SRG NOUVEAU SITE\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/#organization\",\"name\":\"SRG NOUVEAU SITE\",\"url\":\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/wp-content\/uploads\/2025\/11\/logo-srg-blanc-horizontale.png\",\"contentUrl\":\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/wp-content\/uploads\/2025\/11\/logo-srg-blanc-horizontale.png\",\"width\":600,\"height\":150,\"caption\":\"SRG NOUVEAU SITE\"},\"image\":{\"@id\":\"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Service g\u00e9r\u00e9s 360 - SRG NOUVEAU SITE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/services\/","og_locale":"fr_FR","og_type":"article","og_title":"Service g\u00e9r\u00e9s 360 - SRG NOUVEAU SITE","og_description":"Notre services g\u00e9r\u00e9s 360 En quoi consistent les services g\u00e9r\u00e9s\u202f informatique Nos services g\u00e9r\u00e9s 360 offrent aux entreprises une prise en charge compl\u00e8te et proactive de leur environnement technologique. En agissant comme un v\u00e9ritable d\u00e9partement TI externalis\u00e9, nous assurons la gestion quotidienne de vos syst\u00e8mes, \u00e0 distance ou sur place, selon vos besoins. Cette solution [&hellip;]","og_url":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/services\/","og_site_name":"SRG NOUVEAU SITE","article_modified_time":"2026-03-23T18:05:42+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"30 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/services\/","url":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/services\/","name":"Service g\u00e9r\u00e9s 360 - SRG NOUVEAU SITE","isPartOf":{"@id":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/#website"},"datePublished":"2025-11-17T15:55:54+00:00","dateModified":"2026-03-23T18:05:42+00:00","breadcrumb":{"@id":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/services\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/services\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/"},{"@type":"ListItem","position":2,"name":"Service g\u00e9r\u00e9s 360"}]},{"@type":"WebSite","@id":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/#website","url":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/","name":"SRG NOUVEAU SITE","description":"","publisher":{"@id":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/#organization","name":"SRG NOUVEAU SITE","url":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/#\/schema\/logo\/image\/","url":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/wp-content\/uploads\/2025\/11\/logo-srg-blanc-horizontale.png","contentUrl":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/wp-content\/uploads\/2025\/11\/logo-srg-blanc-horizontale.png","width":600,"height":150,"caption":"SRG NOUVEAU SITE"},"image":{"@id":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/wp-json\/wp\/v2\/pages\/163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/wp-json\/wp\/v2\/comments?post=163"}],"version-history":[{"count":117,"href":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/wp-json\/wp\/v2\/pages\/163\/revisions"}],"predecessor-version":[{"id":1786,"href":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/wp-json\/wp\/v2\/pages\/163\/revisions\/1786"}],"wp:attachment":[{"href":"https:\/\/xenodochial-torvalds.54-39-18-128.plesk.page\/index.php\/wp-json\/wp\/v2\/media?parent=163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}