{"id":977,"date":"2020-09-17T08:25:54","date_gmt":"2020-09-17T08:25:54","guid":{"rendered":"http:\/\/wpdemo.archiwp.com\/maxbizz\/?page_id=977"},"modified":"2023-05-29T14:17:35","modified_gmt":"2023-05-29T14:17:35","slug":"cybersecurite","status":"publish","type":"page","link":"https:\/\/hivesia.com\/?page_id=977","title":{"rendered":"CYBERSECURITY"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"977\" class=\"elementor elementor-977\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2c774f8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2c774f8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-904e2fa ot-flex-column-vertical\" data-id=\"904e2fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c3d54a elementor-widget elementor-widget-heading\" data-id=\"3c3d54a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h2 style=\"white-space: normal\">PENTESTS CYBERSECURITE<\/h2><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dec0c01 elementor-widget elementor-widget-text-editor\" data-id=\"dec0c01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div id=\"comp-l7t6r8bv\" class=\"_2Hij5 _3bcaz\" data-testid=\"richTextElement\">\u00a0<\/div><div id=\"comp-l7t6r8bz\" class=\"_2Hij5 _3bcaz\" data-testid=\"richTextElement\"><p class=\"font_8\">Nos experts sont en mesure d&rsquo;effectuer des audits de vos syst\u00e8mes d&rsquo;information (tests de p\u00e9n\u00e9tration cyber) afin de d\u00e9celer les vuln\u00e9rabilit\u00e9s et de proposer des corrections adapt\u00e9es \u00e0 vos moyens, vos infrastructures techniques et les ressources humaines d\u00e9di\u00e9es \u00e0 ces probl\u00e9matiques.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb47081 elementor-widget elementor-widget-heading\" data-id=\"bb47081\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h2 style=\"white-space: normal\">TEST D'INTRUSION PHYSIQUE<\/h2><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc5529b elementor-widget elementor-widget-text-editor\" data-id=\"bc5529b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div id=\"comp-l7t6r8c8\" class=\"_2Hij5 _3bcaz\" data-testid=\"richTextElement\">\u00a0<\/div><div id=\"comp-l7t6r8cd\" class=\"_2Hij5 _3bcaz\" data-testid=\"richTextElement\"><p class=\"font_8\"><span class=\"color_11\">Mandat\u00e9s par la direction de l&rsquo;organisation, nous mettons en \u0153uvre des m\u00e9thodes d&rsquo;acquisition douce de l&rsquo;information sur l&rsquo;entreprise en vue d&rsquo;op\u00e9rer ensuite des intrusions physiques jusqu&rsquo;aux locaux les plus strat\u00e9giques et sensibles. Nous prenons des photos et des vid\u00e9os (si autoris\u00e9) durant les phases d&rsquo;intrusion, pour preuve des failles d\u00e9couvertes.<\/span><\/p><p class=\"font_8\"><span class=\"color_11\">L&rsquo;objectif est de\u00a0tester le dispositif de s\u00e9curit\u00e9 dans son ensemble\u00a0: du personnel de s\u00e9curit\u00e9 aux employ\u00e9s, afin de permettre une\u00a0sensibilisation\u00a0derri\u00e8re selon les failles humaines et techniques d\u00e9couvertes. Le but est bien s\u00fbr\u00a0p\u00e9dagogique\u00a0et non punitif.<\/span><\/p><p class=\"font_8\"><span style=\"color: var( --e-global-color-text ); font-weight: var( --e-global-typography-text-font-weight );\">Les \u00e9tapes se d\u00e9roulent ainsi :<\/span><\/p><ul class=\"color_11 font_8\"><li><p class=\"font_8\"><strong><span class=\"color_11\">Phase amont\u00a0: recherches OSINT (source ouverte) et terrain sur les locaux (plans, photos, etc.) et individus li\u00e9s \u00e0 l&rsquo;entreprise ;<\/span><\/strong><\/p><\/li><li><p class=\"font_8\"><strong><span class=\"color_11\">Phase interm\u00e9diaire\u00a0: analyse des informations collect\u00e9es, \u00e9laboration des sc\u00e9narios d&rsquo;intrusion physique ;<\/span><\/strong><\/p><\/li><li><p class=\"font_8\"><strong><span class=\"color_11\">Phase active\u00a0: mise en oeuvre des sc\u00e9narios d&rsquo;intrusion ;<\/span><\/strong><\/p><\/li><li><p class=\"font_8\"><strong><span class=\"color_11\">Phase aval\u00a0: retour d&rsquo;exp\u00e9rience sur les succ\u00e8s et \u00e9chec des intrusions, grille de notation compl\u00e9t\u00e9e et rapport analytique des points forts et faibles rendu au client, possibilit\u00e9 de fournir une sensibilisation aux employ\u00e9s concern\u00e9s sur un cr\u00e9neau horaire ult\u00e9rieur \u00e9galement.<\/span><\/strong><\/p><\/li><\/ul><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>PENTESTS CYBERSECURITE \u00a0 Nos experts sont en mesure d&rsquo;effectuer des audits de vos syst\u00e8mes d&rsquo;information (tests de p\u00e9n\u00e9tration cyber) afin de d\u00e9celer les vuln\u00e9rabilit\u00e9s et de proposer des corrections adapt\u00e9es \u00e0 vos moyens, vos infrastructures techniques et les ressources humaines d\u00e9di\u00e9es \u00e0 ces probl\u00e9matiques. TEST D&rsquo;INTRUSION PHYSIQUE \u00a0 Mandat\u00e9s par la direction de l&rsquo;organisation, nous [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":868,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"two_page_speed":[],"footnotes":""},"class_list":["post-977","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_hostinger_reach_plugin_has_subscription_block":false,"_hostinger_reach_plugin_is_elementor":false,"jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/hivesia.com\/index.php?rest_route=\/wp\/v2\/pages\/977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hivesia.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hivesia.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hivesia.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hivesia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=977"}],"version-history":[{"count":3,"href":"https:\/\/hivesia.com\/index.php?rest_route=\/wp\/v2\/pages\/977\/revisions"}],"predecessor-version":[{"id":2958,"href":"https:\/\/hivesia.com\/index.php?rest_route=\/wp\/v2\/pages\/977\/revisions\/2958"}],"up":[{"embeddable":true,"href":"https:\/\/hivesia.com\/index.php?rest_route=\/wp\/v2\/pages\/868"}],"wp:attachment":[{"href":"https:\/\/hivesia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}