{"id":1700,"date":"2026-02-14T18:18:20","date_gmt":"2026-02-14T23:18:20","guid":{"rendered":"https:\/\/facilitech.ca\/?page_id=1700"},"modified":"2026-02-14T20:17:29","modified_gmt":"2026-02-15T01:17:29","slug":"cybersecurite-2-2","status":"publish","type":"page","link":"https:\/\/facilitech.ca\/en\/cybersecurite-2-2","title":{"rendered":"Protect your organization from cyber threats 24\/7"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1700\" class=\"elementor elementor-1700\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-25d0670 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"25d0670\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-da8a06e\" data-id=\"da8a06e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4511b9c elementor-widget elementor-widget-image\" data-id=\"4511b9c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"296\" height=\"230\" src=\"https:\/\/facilitech.ca\/wp-content\/uploads\/2020\/08\/authentication-2.svg\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89728ac elementor-widget elementor-widget-spacer\" data-id=\"89728ac\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db55320 elementor-widget elementor-widget-heading\" data-id=\"db55320\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h3 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Saisir ici...\" style=\"text-align: justify;\"><span style=\"font-weight: 700;\"><em>We help you detect, analyze, and neutralize threats before they impact your organization.<\/em>...\"<\/span><span style=\"font-size: 35px;\"><\/span><\/h3><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-341e48f elementor-widget elementor-widget-spacer\" data-id=\"341e48f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05dbcd5 elementor-widget elementor-widget-image\" data-id=\"05dbcd5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"576\" height=\"340\" src=\"https:\/\/facilitech.ca\/wp-content\/uploads\/2023\/05\/affr1.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/facilitech.ca\/wp-content\/uploads\/2023\/05\/affr1.png 576w, https:\/\/facilitech.ca\/wp-content\/uploads\/2023\/05\/affr1-300x177.png 300w, https:\/\/facilitech.ca\/wp-content\/uploads\/2023\/05\/affr1-169x100.png 169w, https:\/\/facilitech.ca\/wp-content\/uploads\/2023\/05\/affr1-136x80.png 136w, https:\/\/facilitech.ca\/wp-content\/uploads\/2023\/05\/affr1-394x233.png 394w\" sizes=\"auto, (max-width: 576px) 100vw, 576px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-618d2b3\" data-id=\"618d2b3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe59a3b elementor-widget elementor-widget-text-editor\" data-id=\"fe59a3b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<h2 data-start=\"541\" data-end=\"574\"><span style=\"color: inherit; font-family: inherit; font-style: inherit; font-weight: inherit;\">Our Services<\/span><\/h2><div>\n<h4 data-start=\"991\" data-end=\"1015\">1\ufe0f\u20e3 Monitoring &amp; SIEM<\/h4>\n<ul data-start=\"1017\" data-end=\"1099\">\n<li data-start=\"1017\" data-end=\"1048\">\n<p data-start=\"1019\" data-end=\"1048\">Centralized log collection<\/p>\n<\/li>\n<li data-start=\"1049\" data-end=\"1075\">\n<p data-start=\"1051\" data-end=\"1075\">Event correlation<\/p>\n<\/li>\n<li data-start=\"1076\" data-end=\"1099\">\n<p data-start=\"1078\" data-end=\"1099\">Real-time alerts<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"1207\" data-end=\"1210\">\n<h4 data-start=\"1212\" data-end=\"1254\">2\ufe0f\u20e3 Endpoint Detection &amp; Response (EDR)<\/h4>\n<ul data-start=\"1256\" data-end=\"1362\">\n<li data-start=\"1256\" data-end=\"1293\">\n<p data-start=\"1258\" data-end=\"1293\">Monitoring of endpoints and servers<\/p>\n<\/li>\n<li data-start=\"1294\" data-end=\"1321\">\n<p data-start=\"1296\" data-end=\"1321\">Behavioral threat detection<\/p>\n<\/li>\n<li data-start=\"1322\" data-end=\"1362\">\n<p data-start=\"1324\" data-end=\"1362\">Automatic isolation in case of attack<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"1429\" data-end=\"1432\">\n<h4 data-start=\"1434\" data-end=\"1460\">3\ufe0f\u20e3 Threat Intelligence<\/h4>\n<ul data-start=\"1462\" data-end=\"1543\">\n<li data-start=\"1462\" data-end=\"1493\">\n<p data-start=\"1464\" data-end=\"1493\">Integration of threat feeds<\/p>\n<\/li>\n<li data-start=\"1494\" data-end=\"1509\">\n<p data-start=\"1496\" data-end=\"1509\">IOC analysis<\/p>\n<\/li>\n<li data-start=\"1510\" data-end=\"1543\">\n<p data-start=\"1512\" data-end=\"1543\">Continuous rule updates<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1545\" data-end=\"1593\">\n<\/p><h4 data-start=\"1600\" data-end=\"1624\">4\ufe0f\u20e3 Incident Response<\/h4>\n<ul data-start=\"1626\" data-end=\"1707\">\n<li data-start=\"1626\" data-end=\"1653\">\n<p data-start=\"1628\" data-end=\"1653\">In-depth investigation<\/p>\n<\/li>\n<li data-start=\"1654\" data-end=\"1674\">\n<p data-start=\"1656\" data-end=\"1674\">Forensic analysis<\/p>\n<\/li>\n<li data-start=\"1675\" data-end=\"1707\">\n<p data-start=\"1677\" data-end=\"1707\">Remediation recommendations<\/p>\n<\/li>\n<\/ul>\n<\/div>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u00ab\u00a0&#8230;Nous d\u00e9tectons, analysons et neutralisons les menaces avant qu\u2019elles n\u2019impactent votre organisation&#8230;\u00a0\u00bb \ud83d\udd0e Nos Services Inclus 1\ufe0f\u20e3 Monitoring &amp; SIEM Collecte centralis\u00e9e des logs Corr\u00e9lation d\u2019\u00e9v\u00e9nements Alertes en temps r\u00e9el 2\ufe0f\u20e3 Endpoint Detection &amp; Response (EDR) Surveillance des postes et &hellip; <a href=\"https:\/\/facilitech.ca\/en\/cybersecurite-2-2\">Read More<\/a><\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-1700","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/facilitech.ca\/en\/wp-json\/wp\/v2\/pages\/1700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/facilitech.ca\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/facilitech.ca\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/facilitech.ca\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/facilitech.ca\/en\/wp-json\/wp\/v2\/comments?post=1700"}],"version-history":[{"count":38,"href":"https:\/\/facilitech.ca\/en\/wp-json\/wp\/v2\/pages\/1700\/revisions"}],"predecessor-version":[{"id":1746,"href":"https:\/\/facilitech.ca\/en\/wp-json\/wp\/v2\/pages\/1700\/revisions\/1746"}],"wp:attachment":[{"href":"https:\/\/facilitech.ca\/en\/wp-json\/wp\/v2\/media?parent=1700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}