top of page


Security plays a major role in computer systems and it is at so many levels that it is sometimes difficult to know where to start.

We know that most of the time, security concerns are not technical, but human. A password on a post-it, information given to the wrong person or simply negligence which can sometimes have disastrous consequences.

Experience once again teaches us that the more technically complex it is, the more difficult it is to maintain and potentially, the more difficult it will be to ensure that there are no security breaches.

The philosophy of "K.I.S.S" (Keep It Simple and Smart) is often the best. 

Indeed, a simple and secure system according to "best practices" will be easier to diagnose, easier to lock and identify backdoors more quickly. 

The ISO/OSI reference model and the 7 layers allow us to seize security from the hardware part to the software part and today even with AI (Artificial Intelligence).

Our job is to ensure that your systems are as protected as possible in order to avoid intrusions, but also and above all to be able to recover your data if something were to happen. Data theft is a tragedy, but the destruction is sometimes worse. The 2 axes of protection are addressed and relocation also plays a major role in data security, because no one is safe from a fire or flooding of your offices. One DRP can make sense in order to have a B plan in the event of a disaster.

We advise you on the hardware, software and governance aspects so that "relative" security is applied and let you sleep peacefully.

Schéma Sécurité

Un accès depuis l'extérieur qui passe par un pare-feu, puis un reverse proxy, puis un Proxy d'authentification forte (MFA) et enfin donnant un accès aux applications de type Docker selon les besoins. Accès à des machines virtuelles ou des PC's sans VPN aussi.

bottom of page