{"id":3314,"date":"2021-01-26T10:21:59","date_gmt":"2021-01-26T15:21:59","guid":{"rendered":"https:\/\/new.b2b2c.ca\/b2bcybersecure\/partenaires\/"},"modified":"2022-11-17T09:08:35","modified_gmt":"2022-11-17T14:08:35","slug":"partners","status":"publish","type":"page","link":"https:\/\/b2bcybersecure.com\/en\/partners\/","title":{"rendered":"Partners"},"content":{"rendered":"\n  <div class=\"banner has-hover is-full-height has-parallax\" id=\"banner-2016058242\">\n          <div class=\"banner-inner fill\">\n        <div class=\"banner-bg fill\" data-parallax=\"-6\" data-parallax-container=\".banner\" data-parallax-background>\n            <div class=\"bg fill bg-fill bg-loaded\"><\/div>\n                        <div class=\"overlay\"><\/div>            \n                    <\/div>\n        <div class=\"banner-layers container\">\n            <div class=\"fill banner-link\"><\/div>            \n   <div id=\"text-box-2110759084\" class=\"text-box banner-layer x50 md-x50 lg-x50 y50 md-y50 lg-y50 res-text\">\n              <div data-parallax=\"1\" data-parallax-fade=\"true\">       <div data-animate=\"none\">           <div class=\"text dark text-shadow-5\">\n              \n              <div class=\"text-inner text-center\">\n                  \n\t<div id=\"gap-1479989038\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1479989038 {\n  padding-top: 7px;\n}\n<\/style>\n\t<\/div>\n\t\n<h2><span style=\"font-size: 140%;\"><strong>Our partners<\/strong><\/span><\/h2>\n\t<div id=\"gap-1776730810\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1776730810 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n<h3><span><strong><span style=\"font-size: 160%;\">A family woven from the strongest cloth<\/span><\/strong><\/span><\/h3>\n<p><b><span style=\"font-size: 17.280000686645508px;\">For 10 years, we have been protecting local businesses with the best cyber security technologies worldwide.<\/span><\/b><\/p>\n<a class=\"button white is-outline hidden\"  >\n    <span>reservez votre consultation gratuite<\/span>\n  <\/a>\n\n\t<div id=\"gap-170162667\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-170162667 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n              <\/div>\n           <\/div>\n       <\/div>       <\/div>              \n<style scope=\"scope\">\n\n#text-box-2110759084 {\n  width: 74%;\n}\n#text-box-2110759084 .text {\n  font-size: 100%;\n}\n\n\n@media (min-width:550px) {\n\n  #text-box-2110759084 {\n    width: 70%;\n  }\n\n}\n<\/style>\n    <\/div>\n \n        <\/div>\n      <\/div>\n\n            \n<style scope=\"scope\">\n\n#banner-2016058242 {\n  padding-top: 100%;\n}\n#banner-2016058242 .bg.bg-loaded {\n  background-image: url(https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/Partenaires-B2B-Cyber-Secure-1-1200x800.jpeg);\n}\n#banner-2016058242 .overlay {\n  background-color: rgba(124, 171, 162, 0.44);\n}\n#banner-2016058242 .bg {\n  background-position: 65% 71%;\n}\n<\/style>\n  <\/div>\n\n\n\t<section class=\"section\" id=\"section_2078986481\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\t<div id=\"gap-1396170454\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1396170454 {\n  padding-top: 50px;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row align-center\"  id=\"row-1122861054\">\n\n\t<div class=\"col small-10 large-12\"  >\n\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n<h2><span style=\"font-size: 130%;\">We are proud to work with them.<\/span><\/h2>\n<p class=\"lead\">B2B Cyber Secure is continuously developing solutions for SMEs in partnership with its network of technological partners. Our customers can count on the strength of our network for the sustainable development of their cyber protection systems. Of this group, here are the most important.<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n\t<div id=\"gap-1762531471\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1762531471 {\n  padding-top: 15px;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_2078986481 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n<\/style>\n\t<\/section>\n\t\n  <style scope=\"scope\">\n    #gallery-186913627 .grid-col-1{height: 600px}\n    #gallery-186913627 .grid-col-1-2{height: 300px}\n    #gallery-186913627 .grid-col-1-3{height:200px}\n    #gallery-186913627 .grid-col-2-3{height: 400px}\n    #gallery-186913627 .grid-col-1-4{height: 150px}\n    #gallery-186913627 .grid-col-3-4{height: 450px}\n\n\n        \/* Tablet *\/\n    @media (max-width: 850px){\n      #gallery-186913627 .grid-col-1{height: 400px}\n      #gallery-186913627 .grid-col-1-2{height: 200px}\n      #gallery-186913627 .grid-col-1-3{height:133.33333333333px}\n      #gallery-186913627 .grid-col-2-3{height: 266.66666666667px}\n      #gallery-186913627 .grid-col-1-4{height: 100px}\n      #gallery-186913627 .grid-col-3-4{height: 300px}\n    }\n    \n        \/* Mobile *\/\n    @media (max-width: 550px){\n      #gallery-186913627 .grid-col-1{height: 400px}\n      #gallery-186913627 .grid-col-1-2{height: 200px}\n      #gallery-186913627 .grid-col-1-3{height:133.33333333333px}\n      #gallery-186913627 .grid-col-2-3{height: 266.66666666667px}\n      #gallery-186913627 .grid-col-1-4{height: 100px}\n      #gallery-186913627 .grid-col-3-4{height: 300px}\n    }\n    \n\n  <\/style>\n  \n  \n    <div id=\"gallery-186913627\" class=\"row row-large row-grid\" data-packery-options='{\"itemSelector\": \".col\", \"gutter\": 0, \"presentageWidth\" : true}'>\n\n          <div class=\"gallery-col col grid-col grid-col-1 large-3 medium-6\" data-animate=\"fadeInUp\">\n          <div class=\"col-inner\">\n                        <div class=\"box has-hover gallery-box box-overlay dark box-text-center\">\n              <div class=\"box-image box-shadow-1 box-shadow-2-hover\" >\n                <img loading=\"lazy\" decoding=\"async\" width=\"653\" height=\"800\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/joel-filipe-ZMRMFULofus-unsplash-1-653x800.jpg\" class=\"attachment-large size-large\" alt=\"\" ids=\"2767,2761,2461,2759,2771,2763,2769,2757\" lightbox=\"false\" type=\"grid\" grid=\"4\" col_spacing=\"large\" depth=\"1\" depth_hover=\"2\" animate=\"fadeInUp\" text_size=\"xlarge\" text_bg=\"rgba(24, 193, 198, 0.35)\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/joel-filipe-ZMRMFULofus-unsplash-1-653x800.jpg 653w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/joel-filipe-ZMRMFULofus-unsplash-1-326x400.jpg 326w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/joel-filipe-ZMRMFULofus-unsplash-1-768x941.jpg 768w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/joel-filipe-ZMRMFULofus-unsplash-1-1253x1536.jpg 1253w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/joel-filipe-ZMRMFULofus-unsplash-1-1671x2048.jpg 1671w\" sizes=\"auto, (max-width: 653px) 100vw, 653px\" \/>                                  <div class=\"overlay fill\"\n                      style=\"background-color: rgba(0,0,0,.15)\">\n                  <\/div>\n                                                              <\/div>\n              <div class=\"box-text text-left is-xlarge dark\" style=\"background-color:rgba(24, 193, 198, 0.35);\">\n                 <p><b> <a href=\"\/en\/partners\/lansweeper-concieerge-level-partner\/\"> Lansweeper <\/a> <\/b> <\/br> <span style = \"font-size: 70%;\"> Inventory tools centralized asset and IT data analysis. <\/span><\/p>\n              <\/div>\n            <\/div>\n                      <\/div>\n         <\/div>\n                 <div class=\"gallery-col col grid-col grid-col-1 large-3 medium-6\" data-animate=\"fadeInUp\">\n          <div class=\"col-inner\">\n                        <div class=\"box has-hover gallery-box box-overlay dark box-text-center\">\n              <div class=\"box-image box-shadow-1 box-shadow-2-hover\" >\n                <img loading=\"lazy\" decoding=\"async\" width=\"533\" height=\"800\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/daniele-levis-pelusi-fUOTndD4Tak-unsplash-533x800.jpg\" class=\"attachment-large size-large\" alt=\"\" ids=\"2767,2761,2461,2759,2771,2763,2769,2757\" lightbox=\"false\" type=\"grid\" grid=\"4\" col_spacing=\"large\" depth=\"1\" depth_hover=\"2\" animate=\"fadeInUp\" text_size=\"xlarge\" text_bg=\"rgba(24, 193, 198, 0.35)\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/daniele-levis-pelusi-fUOTndD4Tak-unsplash-533x800.jpg 533w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/daniele-levis-pelusi-fUOTndD4Tak-unsplash-267x400.jpg 267w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/daniele-levis-pelusi-fUOTndD4Tak-unsplash-768x1152.jpg 768w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/daniele-levis-pelusi-fUOTndD4Tak-unsplash-1024x1536.jpg 1024w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/daniele-levis-pelusi-fUOTndD4Tak-unsplash-1365x2048.jpg 1365w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/daniele-levis-pelusi-fUOTndD4Tak-unsplash-scaled.jpg 1706w\" sizes=\"auto, (max-width: 533px) 100vw, 533px\" \/>                                  <div class=\"overlay fill\"\n                      style=\"background-color: rgba(0,0,0,.15)\">\n                  <\/div>\n                                                              <\/div>\n              <div class=\"box-text text-left is-xlarge dark\" style=\"background-color:rgba(24, 193, 198, 0.35);\">\n                 <p><b> <a href=\"https:\/\/b2bcybersecure.com\/en\/kaspersky-partner-page\/\"> Kaspersky <\/a> <\/b> <\/br> <span style = \"font-size: 70%; \"> The most tested. The most awarded. Over 250K businesses helped. <\/span><\/p>\n              <\/div>\n            <\/div>\n                      <\/div>\n         <\/div>\n                 <div class=\"gallery-col col grid-col grid-col-1 large-3 medium-6\" data-animate=\"fadeInUp\">\n          <div class=\"col-inner\">\n                        <div class=\"box has-hover gallery-box box-overlay dark box-text-center\">\n              <div class=\"box-image box-shadow-1 box-shadow-2-hover\" >\n                <img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/images.september-8-of-8.jpg\" class=\"attachment-large size-large\" alt=\"\" ids=\"2767,2761,2461,2759,2771,2763,2769,2757\" lightbox=\"false\" type=\"grid\" grid=\"4\" col_spacing=\"large\" depth=\"1\" depth_hover=\"2\" animate=\"fadeInUp\" text_size=\"xlarge\" text_bg=\"rgba(24, 193, 198, 0.35)\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/images.september-8-of-8.jpg 1000w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/images.september-8-of-8-600x400.jpg 600w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/images.september-8-of-8-768x512.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/>                                  <div class=\"overlay fill\"\n                      style=\"background-color: rgba(0,0,0,.15)\">\n                  <\/div>\n                                                              <\/div>\n              <div class=\"box-text text-left is-xlarge dark\" style=\"background-color:rgba(24, 193, 198, 0.35);\">\n                 <p><b> <a href=\"https:\/\/www.microsoft.com\/en-ca\/microsoft-365\/enterprise-mobility-security\"> Microsoft <\/a> <\/b> <\/br> <span style = \"font-size: 70%;\"> Security innovations focused on identities and intelligence. <\/span><\/p>\n              <\/div>\n            <\/div>\n                      <\/div>\n         <\/div>\n                 <div class=\"gallery-col col grid-col grid-col-1 large-3 medium-6\" data-animate=\"fadeInUp\">\n          <div class=\"col-inner\">\n                        <div class=\"box has-hover gallery-box box-overlay dark box-text-center\">\n              <div class=\"box-image box-shadow-1 box-shadow-2-hover\" >\n                <img loading=\"lazy\" decoding=\"async\" width=\"534\" height=\"800\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/zane-lee-IPu_f5AF_jE-unsplash-534x800.jpg\" class=\"attachment-large size-large\" alt=\"\" ids=\"2767,2761,2461,2759,2771,2763,2769,2757\" lightbox=\"false\" type=\"grid\" grid=\"4\" col_spacing=\"large\" depth=\"1\" depth_hover=\"2\" animate=\"fadeInUp\" text_size=\"xlarge\" text_bg=\"rgba(24, 193, 198, 0.35)\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/zane-lee-IPu_f5AF_jE-unsplash-534x800.jpg 534w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/zane-lee-IPu_f5AF_jE-unsplash-267x400.jpg 267w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/zane-lee-IPu_f5AF_jE-unsplash-768x1150.jpg 768w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/zane-lee-IPu_f5AF_jE-unsplash-1025x1536.jpg 1025w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/zane-lee-IPu_f5AF_jE-unsplash-1367x2048.jpg 1367w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/zane-lee-IPu_f5AF_jE-unsplash-scaled.jpg 1709w\" sizes=\"auto, (max-width: 534px) 100vw, 534px\" \/>                                  <div class=\"overlay fill\"\n                      style=\"background-color: rgba(0,0,0,.15)\">\n                  <\/div>\n                                                              <\/div>\n              <div class=\"box-text text-left is-xlarge dark\" style=\"background-color:rgba(24, 193, 198, 0.35);\">\n                 <p><b> <a href=\"https:\/\/www.al-enterprise.com\/en-us\/products\/security-network-management\"> Alcatel-Lucent <\/a> <\/b> <\/br> <span style = \"font-size: 70%;\"> Monitoring, maintenance and security tools to minimize risk. <\/span><\/p>\n              <\/div>\n            <\/div>\n                      <\/div>\n         <\/div>\n                 <div class=\"gallery-col col grid-col grid-col-1 large-3 medium-6\" data-animate=\"fadeInUp\">\n          <div class=\"col-inner\">\n                        <div class=\"box has-hover gallery-box box-overlay dark box-text-center\">\n              <div class=\"box-image box-shadow-1 box-shadow-2-hover\" >\n                <img loading=\"lazy\" decoding=\"async\" width=\"1020\" height=\"680\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/maarten-deckers-T5nXYXCf50I-unsplash-1200x800.jpg\" class=\"attachment-large size-large\" alt=\"\" ids=\"2767,2761,2461,2759,2771,2763,2769,2757\" lightbox=\"false\" type=\"grid\" grid=\"4\" col_spacing=\"large\" depth=\"1\" depth_hover=\"2\" animate=\"fadeInUp\" text_size=\"xlarge\" text_bg=\"rgba(24, 193, 198, 0.35)\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/maarten-deckers-T5nXYXCf50I-unsplash-1200x800.jpg 1200w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/maarten-deckers-T5nXYXCf50I-unsplash-600x400.jpg 600w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/maarten-deckers-T5nXYXCf50I-unsplash-768x512.jpg 768w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/maarten-deckers-T5nXYXCf50I-unsplash-1536x1024.jpg 1536w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/maarten-deckers-T5nXYXCf50I-unsplash-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 1020px) 100vw, 1020px\" \/>                                  <div class=\"overlay fill\"\n                      style=\"background-color: rgba(0,0,0,.15)\">\n                  <\/div>\n                                                              <\/div>\n              <div class=\"box-text text-left is-xlarge dark\" style=\"background-color:rgba(24, 193, 198, 0.35);\">\n                 <p><b> <a href=\"https:\/\/www.manageengine.com\/en\/\"> ManageEngine <\/a> <\/b> <\/br> <span style = \"font-size: 70%;\"> A full range of IT management solutions <\/span><\/p>\n              <\/div>\n            <\/div>\n                      <\/div>\n         <\/div>\n                 <div class=\"gallery-col col grid-col grid-col-1 large-3 medium-6\" data-animate=\"fadeInUp\">\n          <div class=\"col-inner\">\n                        <div class=\"box has-hover gallery-box box-overlay dark box-text-center\">\n              <div class=\"box-image box-shadow-1 box-shadow-2-hover\" >\n                <img loading=\"lazy\" decoding=\"async\" width=\"533\" height=\"800\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/chris-panas-Hef0SOqVsCg-unsplash-533x800.jpg\" class=\"attachment-large size-large\" alt=\"\" ids=\"2767,2761,2461,2759,2771,2763,2769,2757\" lightbox=\"false\" type=\"grid\" grid=\"4\" col_spacing=\"large\" depth=\"1\" depth_hover=\"2\" animate=\"fadeInUp\" text_size=\"xlarge\" text_bg=\"rgba(24, 193, 198, 0.35)\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/chris-panas-Hef0SOqVsCg-unsplash-533x800.jpg 533w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/chris-panas-Hef0SOqVsCg-unsplash-267x400.jpg 267w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/chris-panas-Hef0SOqVsCg-unsplash-768x1152.jpg 768w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/chris-panas-Hef0SOqVsCg-unsplash-1024x1536.jpg 1024w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/chris-panas-Hef0SOqVsCg-unsplash-1365x2048.jpg 1365w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/chris-panas-Hef0SOqVsCg-unsplash-scaled.jpg 1707w\" sizes=\"auto, (max-width: 533px) 100vw, 533px\" \/>                                  <div class=\"overlay fill\"\n                      style=\"background-color: rgba(0,0,0,.15)\">\n                  <\/div>\n                                                              <\/div>\n              <div class=\"box-text text-left is-xlarge dark\" style=\"background-color:rgba(24, 193, 198, 0.35);\">\n                 <p><b> <a href=\"https:\/\/www8.hp.com\/ca\/en\/solutions\/computer-security.html\"> HP <\/a> <\/b> <\/br> <span style = \"font-size: 70%;\"> Resiliency applied to desktops and laptops. <\/span><\/p>\n              <\/div>\n            <\/div>\n                      <\/div>\n         <\/div>\n                 <div class=\"gallery-col col grid-col grid-col-1 large-3 medium-6\" data-animate=\"fadeInUp\">\n          <div class=\"col-inner\">\n                        <div class=\"box has-hover gallery-box box-overlay dark box-text-center\">\n              <div class=\"box-image box-shadow-1 box-shadow-2-hover\" >\n                <img loading=\"lazy\" decoding=\"async\" width=\"533\" height=\"800\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/harry-shelton-pPxhM0CRzl4-unsplash-533x800.jpg\" class=\"attachment-large size-large\" alt=\"\" ids=\"2767,2761,2461,2759,2771,2763,2769,2757\" lightbox=\"false\" type=\"grid\" grid=\"4\" col_spacing=\"large\" depth=\"1\" depth_hover=\"2\" animate=\"fadeInUp\" text_size=\"xlarge\" text_bg=\"rgba(24, 193, 198, 0.35)\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/harry-shelton-pPxhM0CRzl4-unsplash-533x800.jpg 533w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/harry-shelton-pPxhM0CRzl4-unsplash-267x400.jpg 267w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/harry-shelton-pPxhM0CRzl4-unsplash-768x1152.jpg 768w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/harry-shelton-pPxhM0CRzl4-unsplash-1024x1536.jpg 1024w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/harry-shelton-pPxhM0CRzl4-unsplash-1365x2048.jpg 1365w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/harry-shelton-pPxhM0CRzl4-unsplash-scaled.jpg 1707w\" sizes=\"auto, (max-width: 533px) 100vw, 533px\" \/>                                  <div class=\"overlay fill\"\n                      style=\"background-color: rgba(0,0,0,.15)\">\n                  <\/div>\n                                                              <\/div>\n              <div class=\"box-text text-left is-xlarge dark\" style=\"background-color:rgba(24, 193, 198, 0.35);\">\n                 <p><b> <a href=\"https:\/\/www.datto.com\/fr\/\"\u00a0> Datto <\/a> <\/b> <\/br> <span style = \"font-size: 70%;\"> Reliable business continuity and disaster recovery solutions sinister. <\/span><\/p>\n              <\/div>\n            <\/div>\n                      <\/div>\n         <\/div>\n                 <div class=\"gallery-col col grid-col grid-col-1 large-3 medium-6\" data-animate=\"fadeInUp\">\n          <div class=\"col-inner\">\n                        <div class=\"box has-hover gallery-box box-overlay dark box-text-center\">\n              <div class=\"box-image box-shadow-1 box-shadow-2-hover\" >\n                <img loading=\"lazy\" decoding=\"async\" width=\"534\" height=\"800\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/zane-lee-cYBmsy3nbk0-unsplash-534x800.jpg\" class=\"attachment-large size-large\" alt=\"\" ids=\"2767,2761,2461,2759,2771,2763,2769,2757\" lightbox=\"false\" type=\"grid\" grid=\"4\" col_spacing=\"large\" depth=\"1\" depth_hover=\"2\" animate=\"fadeInUp\" text_size=\"xlarge\" text_bg=\"rgba(24, 193, 198, 0.35)\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/zane-lee-cYBmsy3nbk0-unsplash-534x800.jpg 534w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/zane-lee-cYBmsy3nbk0-unsplash-267x400.jpg 267w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/zane-lee-cYBmsy3nbk0-unsplash-768x1150.jpg 768w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/zane-lee-cYBmsy3nbk0-unsplash-1025x1536.jpg 1025w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/zane-lee-cYBmsy3nbk0-unsplash-1367x2048.jpg 1367w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/zane-lee-cYBmsy3nbk0-unsplash-scaled.jpg 1709w\" sizes=\"auto, (max-width: 534px) 100vw, 534px\" \/>                                  <div class=\"overlay fill\"\n                      style=\"background-color: rgba(0,0,0,.15)\">\n                  <\/div>\n                                                              <\/div>\n              <div class=\"box-text text-left is-xlarge dark\" style=\"background-color:rgba(24, 193, 198, 0.35);\">\n                 <p><b> <a href= \"https:\/\/www.rheagroup.com\/fr\/\"> REHA Group <\/a> <\/b> <\/br> <span style = \"font-size: 70%;\"> Methods that secure the most demanding environments. <\/span><\/p>\n              <\/div>\n            <\/div>\n                      <\/div>\n         <\/div>\n         <\/div>\n\t<div id=\"gap-1593810662\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1593810662 {\n  padding-top: 60px;\n}\n<\/style>\n\t<\/div>\n\t\n\t<section class=\"section\" id=\"section_1198447244\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\t<section class=\"section\" id=\"section_545021623\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t<div class=\"loading-spin centered\"><\/div>\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n\t<div id=\"gap-1355274025\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-1355274025 {\n  padding-top: 60px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"row\"  id=\"row-638661846\">\n\n\n\t<div class=\"col medium-5 small-12 large-5\"  data-animate=\"bounceInRight\">\n\t\t<div class=\"col-inner text-right\"  >\n\t\t\t\n\t\t\t\n\n<h4 ><span style=\"font-size:160%;\"><a href=\"\/en\/perimeter-the-blog-on-cyber-security-and-it-for-smes\/\">The latest articles from <b><span style=\"color: #ed1c24;\">P<\/span>ERI<span style=\"color: #ed1c24;\">M<\/span>ETE<span style=\"color: #ed1c24;\">R<\/span><\/b><\/a><br \/>\nour blog on CYBER SECURITY and IT for SMEs<\/h4>\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_876452938\">\n\t\t<a class=\"\" href=\"\/en\/perimeter-the-blog-on-cyber-security-and-it-for-smes\/\"  >\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1020\" height=\"681\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2020\/07\/AdobeStock_331752147-1-1199x800.jpeg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2020\/07\/AdobeStock_331752147-1-1199x800.jpeg 1199w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2020\/07\/AdobeStock_331752147-1-600x400.jpeg 600w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2020\/07\/AdobeStock_331752147-1-768x512.jpeg 768w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2020\/07\/AdobeStock_331752147-1-1536x1025.jpeg 1536w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2020\/07\/AdobeStock_331752147-1-2048x1366.jpeg 2048w\" sizes=\"auto, (max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\n<style scope=\"scope\">\n\n#image_876452938 {\n  width: 81%;\n}\n<\/style>\n\t<\/div>\n\t\n\n<p>Knowledge transfer is integral to our approach. Learn about cybersecurity by reading our most recent articles from our blog.<\/p>\n<a href=\"\/en\/perimeter-the-blog-on-cyber-security-and-it-for-smes\/\" target=\"_self\" class=\"button primary is-outline\"  >\n    <span>Visit our blog<\/span>\n  <\/a>\n\n\n\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-1 small-12 large-1\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-6 small-12 large-6\"  data-animate=\"bounceInLeft\">\n\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n\n<div class=\"wprss_ajax\" data-id=\"rssb5b33a0722\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/plugins\/__wp-rss-retriever-pro\/inc\/imgs\/ajax-loader.gif\" alt=\"Loading RSS Feed\" width=\"16\" height=\"16\"><\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_545021623 {\n  padding-top: 0px;\n  padding-bottom: 0px;\n}\n<\/style>\n\t<\/section>\n\t\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_1198447244 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n<\/style>\n\t<\/section>\n\t\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3314","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.9 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Partners - B2B Cyber Secure<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2bcybersecure.com\/en\/partners\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Partners - B2B Cyber Secure\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2bcybersecure.com\/en\/partners\/\" \/>\n<meta property=\"og:site_name\" content=\"B2B Cyber Secure\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-17T14:08:35+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/partners\\\/\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/partners\\\/\",\"name\":\"Partners - B2B Cyber Secure\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#website\"},\"datePublished\":\"2021-01-26T15:21:59+00:00\",\"dateModified\":\"2022-11-17T14:08:35+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/partners\\\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/\",\"name\":\"B2B Cyber Secure\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#organization\",\"name\":\"B2B Cyber Secure\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Logo-B2B-Cyber-secure.png\",\"contentUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Logo-B2B-Cyber-secure.png\",\"width\":67,\"height\":67,\"caption\":\"B2B Cyber Secure\"},\"image\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/b2bcybersecure\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Partners - B2B Cyber Secure","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2bcybersecure.com\/en\/partners\/","og_locale":"en_US","og_type":"article","og_title":"Partners - B2B Cyber Secure","og_url":"https:\/\/b2bcybersecure.com\/en\/partners\/","og_site_name":"B2B Cyber Secure","article_modified_time":"2022-11-17T14:08:35+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2bcybersecure.com\/en\/partners\/","url":"https:\/\/b2bcybersecure.com\/en\/partners\/","name":"Partners - B2B Cyber Secure","isPartOf":{"@id":"https:\/\/b2bcybersecure.com\/en\/#website"},"datePublished":"2021-01-26T15:21:59+00:00","dateModified":"2022-11-17T14:08:35+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2bcybersecure.com\/en\/partners\/"]}]},{"@type":"WebSite","@id":"https:\/\/b2bcybersecure.com\/en\/#website","url":"https:\/\/b2bcybersecure.com\/en\/","name":"B2B Cyber Secure","description":"","publisher":{"@id":"https:\/\/b2bcybersecure.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2bcybersecure.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/b2bcybersecure.com\/en\/#organization","name":"B2B Cyber Secure","url":"https:\/\/b2bcybersecure.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/b2bcybersecure.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/01\/Logo-B2B-Cyber-secure.png","contentUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/01\/Logo-B2B-Cyber-secure.png","width":67,"height":67,"caption":"B2B Cyber Secure"},"image":{"@id":"https:\/\/b2bcybersecure.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/b2bcybersecure\/"]}]}},"_links":{"self":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/pages\/3314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/comments?post=3314"}],"version-history":[{"count":5,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/pages\/3314\/revisions"}],"predecessor-version":[{"id":4391,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/pages\/3314\/revisions\/4391"}],"wp:attachment":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/media?parent=3314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}