{"id":785,"date":"2014-08-16T23:08:54","date_gmt":"2014-08-16T23:08:54","guid":{"rendered":"http:\/\/evosec.eu\/?page_id=785"},"modified":"2016-09-11T00:57:42","modified_gmt":"2016-09-11T00:57:42","slug":"what-we-do","status":"publish","type":"page","link":"https:\/\/evosec.eu\/fr\/what-we-do\/","title":{"rendered":"Ce Que Nous Faisons"},"content":{"rendered":"<h2><a href=\"\/security\"><i class=\"fa fa-shield fa-fw\"><\/i>S\u00c9CURIT\u00c9 DES TI<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i><a href=\"http:\/\/evosec.eu\/smbs-fast-cyber-security-checklist\/\">SMB Quick Check<\/a><\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Audit de s\u00e9curit\u00e9 site Web<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Audit de s\u00e9curit\u00e9 r\u00e9seau<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Audit de s\u00e9curit\u00e9 de serveur<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Audit de s\u00e9curit\u00e9 embarqu\u00e9e<\/li>\n<\/ul>\n<h2><a href=\"\/operations\"><i class=\"fa fa-heartbeat fa-fw\"><\/i>OP\u00c9RATIONS INFORMATIQUES<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Mise en r\u00e9seau<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Serveurs Linux<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Sauvegardes \/ Ransomware-preuve des sauvegardes<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Surveillance de sites Web, adresses IP\/IP Ranges, appareils, etc.<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>3\u00e8me partie\/obsol\u00e8te protocoles mise \u00e0 jour\/int\u00e9grations<\/li>\n<\/ul>\n<h2><a href=\"\/automation\"><i class=\"fa fa-cogs fa-fw\"><\/i>INFORMATIQUE BUREAUTIQUE<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Analyse\/analyse de donn\u00e9es<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Courriels automatis\u00e9s<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Applications personnalis\u00e9es, des scripts ou des solutions pour \u00eatre ex\u00e9cut\u00e9 paraissant incorpor\u00e9 conseils &#8211; Raspberry PI, Arduino etc.<\/li>\n<\/ul>\n<h2><a href=\"\/web-support\"><i class=\"fa fa-user fa-fw\"><\/i>SUPPORT WEB<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Mise \u00e0 jour, de moniteurs et de Patch\u00a0: Sites bas\u00e9 sur WordPress et les Plugins<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Mise \u00e0 jour, de moniteurs et de Patch\u00a0: Sites bas\u00e9s sur Joomla, Plugins &#038; composants<\/li>\n<\/ul>\n<h2><a href=\"\/iot-devices-security-assessment\"><i class=\"fa fa-wifi fa-fw\"><\/i>IoT dispositifs s\u00e9curit\u00e9<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Configuration contr\u00f4le\/d\u00e9pannage<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Mots de passe texte brut\/protocoles non garantis<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Protocoles de r\u00e9tro-ing\u00e9nierie<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Correction des mots de passe, les portes d\u00e9rob\u00e9es, les param\u00e8tres par d\u00e9faut<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>S\u00c9CURIT\u00c9 DES TI SMB Quick Check Audit de s\u00e9curit\u00e9 site Web Audit de s\u00e9curit\u00e9 r\u00e9seau Audit de s\u00e9curit\u00e9 de serveur Audit de s\u00e9curit\u00e9 embarqu\u00e9e OP\u00c9RATIONS INFORMATIQUES Mise en r\u00e9seau Serveurs Linux Sauvegardes \/ Ransomware-preuve des sauvegardes Surveillance de sites Web, adresses IP\/IP Ranges, appareils, etc. 3\u00e8me partie\/obsol\u00e8te protocoles mise \u00e0 &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-785","page","type-page","status-publish","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"fr","enabled_languages":["en","da","de","es","fi","fr","it","hu","nl","no","pl","pt","ru","sv"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"da":{"title":true,"content":true,"excerpt":false},"de":{"title":true,"content":true,"excerpt":false},"es":{"title":true,"content":true,"excerpt":false},"fi":{"title":true,"content":true,"excerpt":false},"fr":{"title":true,"content":true,"excerpt":false},"it":{"title":true,"content":true,"excerpt":false},"hu":{"title":true,"content":true,"excerpt":false},"nl":{"title":true,"content":true,"excerpt":false},"no":{"title":true,"content":true,"excerpt":false},"pl":{"title":true,"content":true,"excerpt":false},"pt":{"title":true,"content":true,"excerpt":false},"ru":{"title":true,"content":true,"excerpt":false},"sv":{"title":true,"content":true,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/evosec.eu\/fr\/wp-json\/wp\/v2\/pages\/785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evosec.eu\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/evosec.eu\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/evosec.eu\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/evosec.eu\/fr\/wp-json\/wp\/v2\/comments?post=785"}],"version-history":[{"count":3,"href":"https:\/\/evosec.eu\/fr\/wp-json\/wp\/v2\/pages\/785\/revisions"}],"predecessor-version":[{"id":2132,"href":"https:\/\/evosec.eu\/fr\/wp-json\/wp\/v2\/pages\/785\/revisions\/2132"}],"wp:attachment":[{"href":"https:\/\/evosec.eu\/fr\/wp-json\/wp\/v2\/media?parent=785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}