{"id":3183,"date":"2024-06-14T07:30:06","date_gmt":"2024-06-14T07:30:06","guid":{"rendered":"https:\/\/www.keytech.be\/?page_id=3183"},"modified":"2024-06-25T14:11:07","modified_gmt":"2024-06-25T14:11:07","slug":"cybersecurite","status":"publish","type":"page","link":"https:\/\/www.keytech.be\/fr\/cybersecurite\/","title":{"rendered":"Cybers\u00e9curit\u00e9"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:100px;--awb-padding-bottom:3%;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:calc( 1260px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_5_6 5_6 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:83.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:35px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;text-transform:none;--fontSize:38;line-height:1.4;\">Une cyberd\u00e9fense en profondeur et multi-couches !<\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><center><iframe width=\"854\" height=\"480\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/CtkP8K6-1O0?si=rZRec4isehrEylYw&controls=0\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/center><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:35px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-1\"><p>KeyTech fournit \u00e0 ses clients une suite compl\u00e8te de services en mati\u00e8re de cybers\u00e9curit\u00e9, visant \u00e0 identifier de mani\u00e8re permanente leurs risques et \u00e0 mettre en place des mesures de protection adapt\u00e9es sur diff\u00e9rents niveaux pour s\u00e9curiser de mani\u00e8re constante leurs actifs num\u00e9riques dans un paysage de menaces en constante \u00e9volution.<\/p>\n<p>Nos services \u00e0 \u00ab\u00a0360\u00b0\u00a0\u00bb incluent :<\/p>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-custom_color_1);--awb-toggle-active-accent-color:var(--awb-custom_color_1);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:24px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:1.4;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-3183-1\"><div class=\"fusion-panel panel-default panel-abe819b4c4db80532 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_abe819b4c4db80532\"><a aria-expanded=\"false\" aria-controls=\"abe819b4c4db80532\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3183-1\" data-target=\"#abe819b4c4db80532\" href=\"#abe819b4c4db80532\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">S\u00e9curit\u00e9 g\u00e9r\u00e9e en tant que service 24\/7<\/span><\/a><\/h4><\/div><div id=\"abe819b4c4db80532\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_abe819b4c4db80532\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>La cybers\u00e9curit\u00e9 n&rsquo;est pas une solution ponctuelle.<\/p>\n<p>Nous proposons des abonnements incluant une gestion continue de votre s\u00e9curit\u00e9 \u00e0 distance y compris :<\/p>\n<ul>\n<li>Une surveillance permanente des vuln\u00e9rabilit\u00e9s et menaces en temps r\u00e9el<\/li>\n<li>Un tableau de bord surveill\u00e9 par nos professionnels<\/li>\n<li>Un rapport des actions de r\u00e9ponse urgentes entreprises et des besoins suppl\u00e9mentaires \u00e0 consid\u00e9rer<\/li>\n<li>La s\u00e9curit\u00e9 de tous les ordinateurs (EDR)<\/li>\n<li>L\u2019analyse des fichiers log<\/li>\n<li>Les mises \u00e0 jour de s\u00e9curit\u00e9<\/li>\n<li>Une int\u00e9gration d\u2019IA<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-8ce6038d4be31ff66 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_8ce6038d4be31ff66\"><a aria-expanded=\"false\" aria-controls=\"8ce6038d4be31ff66\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3183-1\" data-target=\"#8ce6038d4be31ff66\" href=\"#8ce6038d4be31ff66\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Formations en cybers\u00e9curit\u00e9<\/span><\/a><\/h4><\/div><div id=\"8ce6038d4be31ff66\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_8ce6038d4be31ff66\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Sujets abord\u00e9s : escroqueries par phishing, chevaux de Troie, exploitations de vuln\u00e9rabilit\u00e9s, vol et violation de donn\u00e9es, reniflage, ing\u00e9nierie sociale, atteintes \u00e0 la vie priv\u00e9e, attaques par brute force.<\/p>\n<p>En fonction de la taille et des besoins de l&rsquo;entreprise, nous proposons 3 variantes de notre formation\u00a0:<\/p>\n<ul>\n<li>Formation mixte pour les utilisateurs finaux et le personnel informatique (des sessions allant de 2 heures couvrant un sujet sp\u00e9cifique jusqu\u2019\u00e0 2 jours couvrant tous les sujets)<\/li>\n<li>Formation compl\u00e8te pour les utilisateurs finaux (des sessions allant de 2 heures couvrant un sujet sp\u00e9cifique jusqu\u2019\u00e0 2 jours couvrant tous les sujets)<\/li>\n<li>Formation technique pour le personnel informatique (des sessions allant de 2 heures couvrant un sujet sp\u00e9cifique jusqu\u2019\u00e0 2 jours couvrant tous les sujets)<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.keytech.be\/fr\/formations\/#cybersecurity\" target=\"_blank\" rel=\"noopener\">Acc\u00e9dez \u00e0 notre page de formations en cybers\u00e9curit\u00e9<\/a><\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-ba8be59192790f65e fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_ba8be59192790f65e\"><a aria-expanded=\"false\" aria-controls=\"ba8be59192790f65e\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3183-1\" data-target=\"#ba8be59192790f65e\" href=\"#ba8be59192790f65e\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Audits de s\u00e9curit\u00e9<\/span><\/a><\/h4><\/div><div id=\"ba8be59192790f65e\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_ba8be59192790f65e\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>L&rsquo;objectif de nos audits internes est d&rsquo;\u00e9valuer le niveau de maturit\u00e9 d&rsquo;une organisation en mati\u00e8re de r\u00e9silience cybern\u00e9tique et de fournir des recommandations dans un ordre de priorot\u00e9s, allant des \u201cquick wins \u00bb jusqu\u2019\u00e0 \u00e0 la conformit\u00e9 totale avec les normes ISO27001 ou NIS2.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-152e621734c93b5fe fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_152e621734c93b5fe\"><a aria-expanded=\"false\" aria-controls=\"152e621734c93b5fe\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3183-1\" data-target=\"#152e621734c93b5fe\" href=\"#152e621734c93b5fe\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Tests de p\u00e9n\u00e9tration (bo\u00eete noire)<\/span><\/a><\/h4><\/div><div id=\"152e621734c93b5fe\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_152e621734c93b5fe\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>L&rsquo;objectif principal des tests de p\u00e9n\u00e9tration r\u00e9alis\u00e9s par nos hackers \u00e9thiques est de d\u00e9tecter les vuln\u00e9rabilit\u00e9s, les faiblesses et les points d&rsquo;entr\u00e9e potentiels qui pourraient \u00eatre exploit\u00e9s depuis l&rsquo;ext\u00e9rieur sans connaissance pr\u00e9alable de l&rsquo;architecture de l\u2019organisation, ceci afin d&rsquo;\u00e9valuer la capacit\u00e9 \u00e0 se d\u00e9fendre contre les menaces cybern\u00e9tiques r\u00e9centes.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-ff1bb2cfd8550ef79 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_ff1bb2cfd8550ef79\"><a aria-expanded=\"false\" aria-controls=\"ff1bb2cfd8550ef79\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3183-1\" data-target=\"#ff1bb2cfd8550ef79\" href=\"#ff1bb2cfd8550ef79\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Campagnes de phishing personnalis\u00e9es avec micro-apprentissage<\/span><\/a><\/h4><\/div><div id=\"ff1bb2cfd8550ef79\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_ff1bb2cfd8550ef79\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>\u00c9valuez la vuln\u00e9rabilit\u00e9 de vos employ\u00e9s \u00e0 des escroqueries par phishing sophistiqu\u00e9es avec nos simulations hautement personnalisables.<\/p>\n<p>Suivez les r\u00e9sultats (temps de r\u00e9action, clics, &#8230;).<\/p>\n<p>Redirigez les utilisateurs affect\u00e9s vers des modules de micro-apprentissage.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-a8084d8fa5b605ed8 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_a8084d8fa5b605ed8\"><a aria-expanded=\"false\" aria-controls=\"a8084d8fa5b605ed8\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3183-1\" data-target=\"#a8084d8fa5b605ed8\" href=\"#a8084d8fa5b605ed8\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Sauvegardes cloud (s\u00e9curis\u00e9es et isol\u00e9es)<\/span><\/a><\/h4><\/div><div id=\"a8084d8fa5b605ed8\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_a8084d8fa5b605ed8\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Malgr\u00e9 toutes les mesures prises, personne ne peut garantir une s\u00e9curit\u00e9 \u00e0 100% et une attention ad\u00e9quate doit donc \u00eatre accord\u00e9e \u00e0 une r\u00e9cup\u00e9ration rapide en cas d&rsquo;incident.<\/p>\n<p>Avec nos solutions de sauvegarde en ligne s\u00e9curis\u00e9es, nous assurons que toutes les donn\u00e9es de l\u2019entreprise ne sont pas seulement s\u00e9curis\u00e9es, mais surtout rapidement r\u00e9cup\u00e9rables si n\u00e9cessaire.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-903a017b7c0338af1 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_903a017b7c0338af1\"><a aria-expanded=\"false\" aria-controls=\"903a017b7c0338af1\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3183-1\" data-target=\"#903a017b7c0338af1\" href=\"#903a017b7c0338af1\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Wi-Fi s\u00e9curis\u00e9 comme un service<\/span><\/a><\/h4><\/div><div id=\"903a017b7c0338af1\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_903a017b7c0338af1\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Nos contr\u00f4leurs centralis\u00e9s dans le cloud nous permettent de configurer, s\u00e9curiser, mettre \u00e0 jour et surveiller les points d&rsquo;acc\u00e8s de nos clients depuis une console centrale, m\u00eame pour nos clients ayant des emplacements distribu\u00e9s.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-880869d3847508dae fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_880869d3847508dae\"><a aria-expanded=\"false\" aria-controls=\"880869d3847508dae\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3183-1\" data-target=\"#880869d3847508dae\" href=\"#880869d3847508dae\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Configuration et impl\u00e9mentation des politiques de s\u00e9curit\u00e9<\/span><\/a><\/h4><\/div><div id=\"880869d3847508dae\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_880869d3847508dae\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Tous nos ing\u00e9nieurs syst\u00e8mes et d\u00e9veloppeurs sont form\u00e9s pour consid\u00e9rer la s\u00e9curit\u00e9 comme la priorit\u00e9 la plus \u00e9lev\u00e9e dans leurs interventions selon des proc\u00e9dures sp\u00e9cifiques. Ils sont tous comp\u00e9tents dans la mise en \u0153uvre de l\u2019authentification multi-facteurs, du g\u00e9o-blocage, d\u2019un gestionnaire de mots de passe, du chiffrement des donn\u00e9es, des r\u00e8gles de pare-feu et VPN, de la s\u00e9curit\u00e9 DNS, de la s\u00e9curit\u00e9 des sites Web, de la s\u00e9curit\u00e9 SQL, etc.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-905f5a6ed2cec0af3 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_905f5a6ed2cec0af3\"><a aria-expanded=\"false\" aria-controls=\"905f5a6ed2cec0af3\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-3183-1\" data-target=\"#905f5a6ed2cec0af3\" href=\"#905f5a6ed2cec0af3\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Footprinting<\/span><\/a><\/h4><\/div><div id=\"905f5a6ed2cec0af3\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_905f5a6ed2cec0af3\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Le footprinting est le fait de collecter des donn\u00e9es sur une entreprise afin de r\u00e9aliser une cyberattaque cibl\u00e9e. Notre analyse des empreintes digitales en utilisant des techniques et des outils connus tels que l&rsquo;OSINT, le google dorking, les fuites sur le dark web, &#8230; vous montrera toutes les informations qui sont expos\u00e9es sur Internet concernant votre entreprise, vos employ\u00e9s et leurs appareils et qui pourraient \u00eatre un risque potentiel pour votre organisation.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:35px;width:100%;\"><\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_text_transform:uppercase;\" target=\"_self\" href=\"#\" data-toggle=\"modal\" data-target=\".fusion-modal.contact_cybersec\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Je souhaite recevoir une offre<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling lazyload\" style=\"--awb-background-blend-mode:overlay;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:5%;--awb-padding-bottom:6%;--awb-background-color:rgba(32,32,32,0.35);--awb-background-size:cover;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/10\/cybersecurity-hacker-dark.jpg\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:calc( 1260px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_5_6 5_6 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:83.333333333333%;--awb-margin-top-large:40px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:40px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:38;line-height:1.4;\">La prise de conscience est le premier pas vers l\u2019action.<\/h2><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/www.keytech.be\/fr\/contact\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">CONTACTEZ-NOUS<\/span><\/a><\/div><div class=\"fusion-modal modal fade modal-1 contact_cybersec\" tabindex=\"-1\" role=\"dialog\" aria-labelledby=\"modal-heading-1\" aria-hidden=\"true\" style=\"--awb-border-color:var(--awb-color3);--awb-background:var(--awb-color2);\"><div class=\"modal-dialog modal-lg\" role=\"document\"><div class=\"modal-content fusion-modal-content\"><div class=\"modal-header\"><button class=\"close\" type=\"button\" data-dismiss=\"modal\" aria-hidden=\"true\" aria-label=\"Close\">&times;<\/button><h3 class=\"modal-title\" id=\"modal-heading-1\" data-dismiss=\"modal\" aria-hidden=\"true\">Souhaitez-vous en savoir plus sur nos services de cybers\u00e9curit\u00e9 ?<\/h3><\/div><div class=\"modal-body fusion-clearfix\">\n<p>Merci de cocher le ou les sujet(s) de votre choix dans le formulaire ci-dessous et un expert vous recontactera dans les 48h.<\/p>\n<div class=\"fusion-form fusion-form-builder fusion-form-form-wrapper fusion-form-3189\" style=\"--awb-tooltip-text-color:#ffffff;--awb-tooltip-background-color:#333333;--awb-form-input-height:45px;--awb-form-font-size:15px;--awb-form-border-color:var(--awb-color7);--awb-form-focus-border-color:var(--awb-color7);--awb-form-focus-border-hover-color:hsla(var(--awb-color7-h),var(--awb-color7-s),var(--awb-color7-l),calc(var(--awb-color7-a) - 50%));\" data-form-id=\"3189\" data-config=\"{&quot;form_id&quot;:3189,&quot;form_post_id&quot;:3189,&quot;post_id&quot;:3183,&quot;form_type&quot;:&quot;ajax&quot;,&quot;confirmation_type&quot;:&quot;message&quot;,&quot;redirect_url&quot;:&quot;&quot;,&quot;redirect_timeout&quot;:&quot;0&quot;,&quot;field_labels&quot;:{&quot;topics&quot;:&quot;Je souhaiterais plus d&#039;informations sur les solutions en mati\\u00e8re de cybers\\u00e9curit\\u00e9&quot;,&quot;firstname&quot;:&quot;&quot;,&quot;lastname&quot;:&quot;&quot;,&quot;email&quot;:&quot;&quot;,&quot;phone&quot;:&quot;&quot;,&quot;company&quot;:&quot;&quot;,&quot;job&quot;:&quot;&quot;,&quot;message&quot;:&quot;&quot;},&quot;field_logics&quot;:{&quot;topics&quot;:&quot;&quot;,&quot;firstname&quot;:&quot;&quot;,&quot;lastname&quot;:&quot;&quot;,&quot;email&quot;:&quot;&quot;,&quot;phone&quot;:&quot;&quot;,&quot;company&quot;:&quot;&quot;,&quot;job&quot;:&quot;&quot;,&quot;message&quot;:&quot;&quot;,&quot;submit_1&quot;:&quot;&quot;,&quot;notice_1&quot;:&quot;&quot;},&quot;field_types&quot;:{&quot;topics&quot;:&quot;checkbox&quot;,&quot;firstname&quot;:&quot;text&quot;,&quot;lastname&quot;:&quot;text&quot;,&quot;email&quot;:&quot;email&quot;,&quot;phone&quot;:&quot;phone_number&quot;,&quot;company&quot;:&quot;text&quot;,&quot;job&quot;:&quot;text&quot;,&quot;message&quot;:&quot;textarea&quot;,&quot;submit_1&quot;:&quot;submit&quot;,&quot;recaptcha_1&quot;:&quot;recaptcha&quot;,&quot;notice_1&quot;:&quot;notice&quot;},&quot;nonce_method&quot;:&quot;ajax&quot;,&quot;form_views&quot;:&quot;ajax&quot;,&quot;form_views_counting&quot;:&quot;all&quot;}\"><form action=\"https:\/\/www.keytech.be\/fr\/cybersecurite\/\" method=\"post\" class=\"fusion-form fusion-form-3189\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:-20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-margin-top-medium:-20px;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-margin-top-small:-20px;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-form-field fusion-form-checkbox-field fusion-form-label-above topic\" style=\"\" data-form-id=\"3189\"><fieldset data-awb-fieldset-min-required=\"1\" data-awb-fieldset-max-required=\"9\" data-awb-fieldset-error=\"Please select at least one topic!\"><legend class=\"fusion-form-label-wrapper\"><span class=\"label\">Je souhaiterais plus d&#039;informations sur les solutions en mati\u00e8re de cybers\u00e9curit\u00e9 <abbr class=\"fusion-form-element-required\" title=\"Please select at least one topic!\">*<\/abbr><\/span><div class=\"fusion-form-tooltip\"><i class=\"awb-icon-question-circle\"><\/i><span class=\"fusion-form-tooltip-content\">Veuillez s\u00e9lectionner au moins un sujet !<\/span><\/div><\/legend><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-0\" type=\"checkbox\" value=\"S\u00e9curit\u00e9 g\u00e9r\u00e9e comme un service 24\/7\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-0\">S\u00e9curit\u00e9 g\u00e9r\u00e9e comme un service 24\/7<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-1\" type=\"checkbox\" value=\"Formations\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-1\">Formations<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-2\" type=\"checkbox\" value=\"Audits\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-2\">Audits<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-3\" type=\"checkbox\" value=\"Tests de p\u00e9n\u00e9tration\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-3\">Tests de p\u00e9n\u00e9tration<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-4\" type=\"checkbox\" value=\"Campagnes de phishing\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-4\">Campagnes de phishing<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-5\" type=\"checkbox\" value=\"Sauvegardes Cloud\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-5\">Sauvegardes Cloud<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-6\" type=\"checkbox\" value=\"Wi-Fi s\u00e9curis\u00e9\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-6\">Wi-Fi s\u00e9curis\u00e9<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-7\" type=\"checkbox\" value=\"Configuration et impl\u00e9mentation des politiques de s\u00e9curit\u00e9\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-7\">Configuration et impl\u00e9mentation des politiques de s\u00e9curit\u00e9<\/label><\/div><div class=\"fusion-form-checkbox option-inline\"><input data-empty-notice=\"Please select at least one topic!\" tabindex=\"\" id=\"checkbox-topics-1-8\" type=\"checkbox\" value=\"Footprinting\" name=\"topics[]\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"checkbox-topics-1-8\">Footprinting<\/label><\/div><\/fieldset><\/div><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"3189\"><input type=\"text\" autocomplete=\"off\" name=\"firstname\" id=\"firstname\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" placeholder=\"Pr\u00e9nom *\" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"3189\"><input type=\"text\" autocomplete=\"off\" name=\"lastname\" id=\"lastname\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" placeholder=\"Nom de famille *\" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><div class=\"fusion-form-field fusion-form-email-field fusion-form-label-above\" style=\"\" data-form-id=\"3189\"><input type=\"email\" autocomplete=\"off\" name=\"email\" id=\"email\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" placeholder=\"Email *\" data-holds-private-data=\"false\"\/><\/div><div class=\"fusion-form-field fusion-form-phone-number-field fusion-form-label-above\" style=\"\" data-form-id=\"3189\"><input type=\"tel\" autocomplete=\"off\" name=\"phone\" id=\"phone\" value=\"\"  class=\"fusion-form-input\" placeholder=\"Num\u00e9ro de t\u00e9l\u00e9phone \" data-holds-private-data=\"false\"\/><\/div><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"3189\"><input type=\"text\" autocomplete=\"off\" name=\"company\" id=\"company\" value=\"\"  class=\"fusion-form-input\" placeholder=\"Soci\u00e9t\u00e9 \" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"3189\"><input type=\"text\" autocomplete=\"off\" name=\"job\" id=\"job\" value=\"\"  class=\"fusion-form-input\" placeholder=\"Fonction \" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><div class=\"fusion-form-field fusion-form-textarea-field fusion-form-label-above\" style=\"\" data-form-id=\"3189\"><textarea cols=\"40\" autocomplete=\"off\"  minlength=\"0\"  rows=\"4\" tabindex=\"\" id=\"message\" name=\"message\" class=\"fusion-form-input\" placeholder=\"Autre(s) question(s) ici \" data-holds-private-data=\"false\"><\/textarea><\/div><div class=\"fusion-form-field fusion-form-submit-field fusion-form-label-above\" style=\"\" data-form-id=\"3189\"><div class=\"fusion-button-wrapper fusion-aligncenter\"><button type=\"submit\" class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-3 fusion-button-default-span  button-default form-form-submit\" style=\"--awb-margin-bottom:30px;\" data-form-number=\"3189\" tabindex=\"\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Envoyer<\/span><\/button><\/div><\/div><div class=\"fusion-form-field fusion-form-recaptcha-field fusion-form-label-above\" style=\"\" data-form-id=\"3189\">\t\t\t\t<div class=\"form-creator-recaptcha\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tid=\"g-recaptcha-id-form-3189\"\n\t\t\t\t\t\t\tclass=\"fusion-form-recaptcha-v3 recaptcha-container  fusion-form-hide-recaptcha-badge\"\n\t\t\t\t\t\t\tdata-sitekey=\"6LdQojwiAAAAAPdAow3cEOtGjSwVtrDdKbgCAeue\"\n\t\t\t\t\t\t\tdata-badge=\"hide\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"hidden\"\n\t\t\t\t\t\t\tname=\"fusion-form-recaptcha-response\"\n\t\t\t\t\t\t\tclass=\"g-recaptcha-response\"\n\t\t\t\t\t\t\tid=\"fusion-form-recaptcha-response-3189\"\n\t\t\t\t\t\t\tvalue=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div><div class=\"form-submission-notices data-notice_1\" id=\"fusion-notices-1\" data-instance=\"1\"><div class=\"fusion-alert alert success alert-success fusion-alert-center fusion-form-response fusion-form-response-success fusion-alert-capitalize awb-alert-native-link-color alert-dismissable awb-alert-close-boxed\" role=\"alert\"><div class=\"fusion-alert-content-wrapper\"><span class=\"alert-icon\"><i class=\"awb-icon-check-circle\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-alert-content\">Thank you for your message. It has been sent.<\/span><\/div><button type=\"button\" class=\"close toggle-alert\" data-dismiss=\"alert\" aria-label=\"Close\">&times;<\/button><\/div><div class=\"fusion-alert alert error alert-danger fusion-alert-center fusion-form-response fusion-form-response-error fusion-alert-capitalize awb-alert-native-link-color alert-dismissable awb-alert-close-boxed\" role=\"alert\"><div class=\"fusion-alert-content-wrapper\"><span class=\"alert-icon\"><i class=\"awb-icon-exclamation-triangle\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-alert-content\">There was an error trying to send your message. Please try again later.<\/span><\/div><button type=\"button\" class=\"close toggle-alert\" data-dismiss=\"alert\" aria-label=\"Close\">&times;<\/button><\/div><\/div><\/div><\/div><\/div><\/div><\/form><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-3183","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>KeyTech - Cybers\u00e9curit\u00e9<\/title>\n<meta name=\"description\" content=\"KeyTech fournit \u00e0 ses clients une suite compl\u00e8te de services en mati\u00e8re de cybers\u00e9curit\u00e9 dont des formations, des audits et autres services.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.keytech.be\/fr\/cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"KeyTech - Cybers\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"KeyTech fournit \u00e0 ses clients une suite compl\u00e8te de services en mati\u00e8re de cybers\u00e9curit\u00e9 dont des formations, des audits et autres services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.keytech.be\/fr\/cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"KeyTech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/keytech.be\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-25T14:11:07+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@keytechbe\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture est.\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/cybersecurite\\\/\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/cybersecurite\\\/\",\"name\":\"KeyTech - Cybers\u00e9curit\u00e9\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#website\"},\"datePublished\":\"2024-06-14T07:30:06+00:00\",\"dateModified\":\"2024-06-25T14:11:07+00:00\",\"description\":\"KeyTech fournit \u00e0 ses clients une suite compl\u00e8te de services en mati\u00e8re de cybers\u00e9curit\u00e9 dont des formations, des audits et autres services.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/cybersecurite\\\/#breadcrumb\"},\"inLanguage\":\"fr-BE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.keytech.be\\\/fr\\\/cybersecurite\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/cybersecurite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/\",\"name\":\"KeyTech\",\"description\":\"Digital innovation with a human touch\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-BE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#organization\",\"name\":\"KeyTech\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-BE\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/LogoKeyTech.jpg\",\"contentUrl\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/LogoKeyTech.jpg\",\"width\":500,\"height\":500,\"caption\":\"KeyTech\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/keytech.be\",\"https:\\\/\\\/x.com\\\/keytechbe\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/keytechbelgium\",\"https:\\\/\\\/www.instagram.com\\\/keytech.be\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"KeyTech - Cybers\u00e9curit\u00e9","description":"KeyTech fournit \u00e0 ses clients une suite compl\u00e8te de services en mati\u00e8re de cybers\u00e9curit\u00e9 dont des formations, des audits et autres services.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.keytech.be\/fr\/cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"KeyTech - Cybers\u00e9curit\u00e9","og_description":"KeyTech fournit \u00e0 ses clients une suite compl\u00e8te de services en mati\u00e8re de cybers\u00e9curit\u00e9 dont des formations, des audits et autres services.","og_url":"https:\/\/www.keytech.be\/fr\/cybersecurite\/","og_site_name":"KeyTech","article_publisher":"https:\/\/www.facebook.com\/keytech.be","article_modified_time":"2024-06-25T14:11:07+00:00","twitter_card":"summary_large_image","twitter_site":"@keytechbe","twitter_misc":{"Dur\u00e9e de lecture est.":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.keytech.be\/fr\/cybersecurite\/","url":"https:\/\/www.keytech.be\/fr\/cybersecurite\/","name":"KeyTech - Cybers\u00e9curit\u00e9","isPartOf":{"@id":"https:\/\/www.keytech.be\/en\/#website"},"datePublished":"2024-06-14T07:30:06+00:00","dateModified":"2024-06-25T14:11:07+00:00","description":"KeyTech fournit \u00e0 ses clients une suite compl\u00e8te de services en mati\u00e8re de cybers\u00e9curit\u00e9 dont des formations, des audits et autres services.","breadcrumb":{"@id":"https:\/\/www.keytech.be\/fr\/cybersecurite\/#breadcrumb"},"inLanguage":"fr-BE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.keytech.be\/fr\/cybersecurite\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.keytech.be\/fr\/cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.keytech.be\/fr\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.keytech.be\/en\/#website","url":"https:\/\/www.keytech.be\/en\/","name":"KeyTech","description":"Digital innovation with a human touch","publisher":{"@id":"https:\/\/www.keytech.be\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.keytech.be\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-BE"},{"@type":"Organization","@id":"https:\/\/www.keytech.be\/en\/#organization","name":"KeyTech","url":"https:\/\/www.keytech.be\/en\/","logo":{"@type":"ImageObject","inLanguage":"fr-BE","@id":"https:\/\/www.keytech.be\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/06\/LogoKeyTech.jpg","contentUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/06\/LogoKeyTech.jpg","width":500,"height":500,"caption":"KeyTech"},"image":{"@id":"https:\/\/www.keytech.be\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/keytech.be","https:\/\/x.com\/keytechbe","https:\/\/www.linkedin.com\/company\/keytechbelgium","https:\/\/www.instagram.com\/keytech.be\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/pages\/3183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/comments?post=3183"}],"version-history":[{"count":17,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/pages\/3183\/revisions"}],"predecessor-version":[{"id":3231,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/pages\/3183\/revisions\/3231"}],"wp:attachment":[{"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/media?parent=3183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}